General
-
Target
b80b5ae75cc2fbd9c0009b85aae87fe0e57b031c3b799b07b23941de2f8dfb11
-
Size
764KB
-
Sample
240528-b2xqbsbb35
-
MD5
73fe7dcad838afe2e670b4c0f1e5e838
-
SHA1
94fccd5c9c345e4452321833bec5413213606bce
-
SHA256
b80b5ae75cc2fbd9c0009b85aae87fe0e57b031c3b799b07b23941de2f8dfb11
-
SHA512
9b89fdb299a3f1dce6074e9bdde2d2dae5d617409d99aff1829d1ffd36975d1f7c14fc931721c146eea79264bd1af8fe8a33c7046b36f38d7ef9dd8c446bb6df
-
SSDEEP
12288:+0LTyvK/lXkS/q/jX8O7+hbsJZ7juIEsE/KsPPJamhWR0V4vxChYDwr0sos+Op:+0yiXdqKsHKIEsEyO4Co0aM1/+O
Static task
static1
Behavioral task
behavioral1
Sample
b80b5ae75cc2fbd9c0009b85aae87fe0e57b031c3b799b07b23941de2f8dfb11.exe
Resource
win7-20231129-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Brillium360@@ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Brillium360@@
Targets
-
-
Target
b80b5ae75cc2fbd9c0009b85aae87fe0e57b031c3b799b07b23941de2f8dfb11
-
Size
764KB
-
MD5
73fe7dcad838afe2e670b4c0f1e5e838
-
SHA1
94fccd5c9c345e4452321833bec5413213606bce
-
SHA256
b80b5ae75cc2fbd9c0009b85aae87fe0e57b031c3b799b07b23941de2f8dfb11
-
SHA512
9b89fdb299a3f1dce6074e9bdde2d2dae5d617409d99aff1829d1ffd36975d1f7c14fc931721c146eea79264bd1af8fe8a33c7046b36f38d7ef9dd8c446bb6df
-
SSDEEP
12288:+0LTyvK/lXkS/q/jX8O7+hbsJZ7juIEsE/KsPPJamhWR0V4vxChYDwr0sos+Op:+0yiXdqKsHKIEsEyO4Co0aM1/+O
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-