General
-
Target
e75eb158aae9d78f3b3a66062e6343784e19589240429ecde67adb5744c949dd
-
Size
690KB
-
Sample
240523-czzycaaf51
-
MD5
bfc94099f30c1651fbe6eff2554c7bc6
-
SHA1
2b1f0234cd7a0376ad69db4cc23671ad1eed7aad
-
SHA256
e75eb158aae9d78f3b3a66062e6343784e19589240429ecde67adb5744c949dd
-
SHA512
05709d3d3828d7e55a9909f7c8582461174ff1160bbcd17578f6b8aba47bb9a23ffac5305ac3c2d4df6fd0d49df2ed233a29b8b6b31eeeb2f475f320d928d36f
-
SSDEEP
12288:OKzi8LkpEaV3urpXm4zbOSrZeiYJlaD38DqBOQgO+SeC8yITUZ7quWXaeukR:OK2jECurpLbDteiGlIjPH6KT1u
Static task
static1
Behavioral task
behavioral1
Sample
e75eb158aae9d78f3b3a66062e6343784e19589240429ecde67adb5744c949dd.exe
Resource
win7-20231129-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
premium162.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
Look@oursuccess247 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
premium162.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
Look@oursuccess247
Targets
-
-
Target
e75eb158aae9d78f3b3a66062e6343784e19589240429ecde67adb5744c949dd
-
Size
690KB
-
MD5
bfc94099f30c1651fbe6eff2554c7bc6
-
SHA1
2b1f0234cd7a0376ad69db4cc23671ad1eed7aad
-
SHA256
e75eb158aae9d78f3b3a66062e6343784e19589240429ecde67adb5744c949dd
-
SHA512
05709d3d3828d7e55a9909f7c8582461174ff1160bbcd17578f6b8aba47bb9a23ffac5305ac3c2d4df6fd0d49df2ed233a29b8b6b31eeeb2f475f320d928d36f
-
SSDEEP
12288:OKzi8LkpEaV3urpXm4zbOSrZeiYJlaD38DqBOQgO+SeC8yITUZ7quWXaeukR:OK2jECurpLbDteiGlIjPH6KT1u
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-