General
-
Target
dd198badcb4ccf61a7e3b74015f9e2491442c698ba164821b9da3de94ea160bd
-
Size
663KB
-
Sample
240613-c7e8xavgjk
-
MD5
b371c0cedb35134bd01140506e1a1996
-
SHA1
d7a5783524a6087549c54ba212927c4ce6169b11
-
SHA256
dd198badcb4ccf61a7e3b74015f9e2491442c698ba164821b9da3de94ea160bd
-
SHA512
419d6c6e5c82ce8b262c332727028922f874f3afcca5210cd22b6c92932fc2a0828057ed6277d03bde6bf7a1e5cf06905d62ae9dedd19738d4be85cc14dc3311
-
SSDEEP
12288:FSkIV8CmbZNDp8+8WLc7YBd9qlZcU5/Bo+65PNYd6TeuCG9kk89Sk2X:FSVV8TbPDWYc74dzYG5t2d6TeuC59hK
Static task
static1
Behavioral task
behavioral1
Sample
new inquiry 756564388.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
new inquiry 756564388.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.shaktiinstrumentations.in - Port:
587 - Username:
[email protected] - Password:
Shakti54231!@#$%#@! - Email To:
[email protected]
Targets
-
-
Target
new inquiry 756564388.exe
-
Size
753KB
-
MD5
e2616e5db25d1d56369b2353e2858a09
-
SHA1
32673a86272a13051f31d3a1cb7b0f4feb24bf01
-
SHA256
f8adf6e66d98c552826f03dd2f5762f8b0b20e7fb5d3ed4f3c3f706f4b89bbe0
-
SHA512
9b55d586ab5dfd87c3c6801cb513f00ef3b0a2165b4dc31db4c5d550bdd34d605970c0eb00366955c066d535d67444ce3bc9caf746008ab9fae1882170bbac9b
-
SSDEEP
12288:BdXtfET1T8+mb9NDp8Q8WLc2a1WaZhBERKOeDJa2kR:Bd921T8nb7D+YcN1zbqcO3t
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-