General
-
Target
50bf65b162af4717114d98c21922624b.bin
-
Size
618KB
-
Sample
240529-cb8wcaef79
-
MD5
b98990e51c2cda230fc6db8292b08f0a
-
SHA1
5d8a2aa85bdc2e20ebc9298eebe2aabe1016a184
-
SHA256
d8e949008358efee34b6e1a3443b71f6b876da13bcc1f8e6a7b292f53444ecdd
-
SHA512
2ab3b255c2028dcae9f6b6ceedb61bcf6baa8adb0949608605b590ea4ddbb874e7b649dfd7798a905fd0ae8f11187913aa5317534d11d4a35421b12bb0379ed6
-
SSDEEP
12288:q6TQqUNDhVGX/nayKJmIJRp4mCHeyqaZQvAgoRPOgBTA4Klk1vN:DTQzbU9mCHEe5fBk4K6
Static task
static1
Behavioral task
behavioral1
Sample
Eaton PO-45150292964.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.voivocars.com - Port:
587 - Username:
[email protected] - Password:
ettyquest11 - Email To:
[email protected]
Targets
-
-
Target
Eaton PO-45150292964.bat
-
Size
656KB
-
MD5
c8b8fcd8d144b407e72583a4168d2404
-
SHA1
a4752e915714c2ef3c1677d92036f59a2c733542
-
SHA256
aadb33b16813d11fedf84427622b20fe6381534a5ab973adb309e05b5b7be182
-
SHA512
8a3a4325aa83b82e12a479a45c378b9819b6fa4c11535c22072cbf73f4442f54eb61a98af4dc88e55c109f14465f5d5c528a5479a3d2a5d8ce07e2c231ef2d11
-
SSDEEP
12288:puUrYCFd6xHxLSCGLEDzAjYSJYZ7LfRS3xWF+9+qpuctejkR:t81xRuCEYSk7LfsuGucA2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-