General
-
Target
561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
-
Size
3.5MB
-
Sample
240604-r18dfaae5y
-
MD5
d6f6d056221be8a9545efc7dff08e56a
-
SHA1
5b245398672670653a2afdd33f0e0b02b0a5fc41
-
SHA256
561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b
-
SHA512
452bc38856d088d6c0376cce6ece9819ec4bf22ddb8cee439a2e3444137dea0e3d78b2200ecf209bb9a1a3bc7920cfbcb41ac4ae45918cd947e45b884d853e1b
-
SSDEEP
98304:/5KgsYz+zd0ympj+Wx8SLkzwTUCmpsG51Q28oFpePq:/qYqz25+8dkUwCasP2lpeP
Static task
static1
Behavioral task
behavioral1
Sample
561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.jalcepsac.com - Port:
587 - Username:
[email protected] - Password:
@jalcepsac.com - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.jalcepsac.com - Port:
587 - Username:
[email protected] - Password:
@jalcepsac.com
Targets
-
-
Target
561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
-
Size
3.5MB
-
MD5
d6f6d056221be8a9545efc7dff08e56a
-
SHA1
5b245398672670653a2afdd33f0e0b02b0a5fc41
-
SHA256
561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b
-
SHA512
452bc38856d088d6c0376cce6ece9819ec4bf22ddb8cee439a2e3444137dea0e3d78b2200ecf209bb9a1a3bc7920cfbcb41ac4ae45918cd947e45b884d853e1b
-
SSDEEP
98304:/5KgsYz+zd0ympj+Wx8SLkzwTUCmpsG51Q28oFpePq:/qYqz25+8dkUwCasP2lpeP
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-