General
-
Target
3c6d4b1f44029528b67277bee75b7936c38481dcdcef4d4f383e7b467d017cc2
-
Size
753KB
-
Sample
240612-ckad5sydmh
-
MD5
a10c303687dbfa01a1cde1e2d12c35dc
-
SHA1
07267b76c33231918f45dc6c2c5a068dd45a8d89
-
SHA256
3c6d4b1f44029528b67277bee75b7936c38481dcdcef4d4f383e7b467d017cc2
-
SHA512
787eae41edb11779c5cc57abe134614989a1c394ad448d7a450025f5c282e075a7b51ba81aebaa3123ceb158197ac2895a8f99488977b114db66300af5b88693
-
SSDEEP
12288:qefJd3r5WDJYkOsDfZxYOZCpWdJ9HIT5C//mL4F3Q9ytW0avehK8EACR5leZlN:xfX3Ne/Oo3ZxdYL4F3K0zhKZA+er
Static task
static1
Behavioral task
behavioral1
Sample
3c6d4b1f44029528b67277bee75b7936c38481dcdcef4d4f383e7b467d017cc2.exe
Resource
win7-20240611-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.commtechtrading.com - Port:
587 - Username:
[email protected] - Password:
;elP@ho2Np 7[ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.commtechtrading.com - Port:
587 - Username:
[email protected] - Password:
;elP@ho2Np 7[
Targets
-
-
Target
3c6d4b1f44029528b67277bee75b7936c38481dcdcef4d4f383e7b467d017cc2
-
Size
753KB
-
MD5
a10c303687dbfa01a1cde1e2d12c35dc
-
SHA1
07267b76c33231918f45dc6c2c5a068dd45a8d89
-
SHA256
3c6d4b1f44029528b67277bee75b7936c38481dcdcef4d4f383e7b467d017cc2
-
SHA512
787eae41edb11779c5cc57abe134614989a1c394ad448d7a450025f5c282e075a7b51ba81aebaa3123ceb158197ac2895a8f99488977b114db66300af5b88693
-
SSDEEP
12288:qefJd3r5WDJYkOsDfZxYOZCpWdJ9HIT5C//mL4F3Q9ytW0avehK8EACR5leZlN:xfX3Ne/Oo3ZxdYL4F3K0zhKZA+er
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-