General
-
Target
fd6989c90587630a61d42a4bbe2cd796a8e0eb6c5c15f813c440b00d416863ee
-
Size
787KB
-
Sample
240616-bjtkyswhrm
-
MD5
e5ad7958e87bbe382c5c252222c14664
-
SHA1
639f3cfa46e5e53e449ce691a49b9f5924e9b0ba
-
SHA256
fd6989c90587630a61d42a4bbe2cd796a8e0eb6c5c15f813c440b00d416863ee
-
SHA512
13d03c03942781746845faa032fed125c717cbd72843fe4dae63f2cac27e8afaa25cc427bf379cc950d17b5648e12bbd3c98bcd218f14c7fb3f105415fb12170
-
SSDEEP
12288:ex/2iNPyCK2xrOonIXzEzgAWizmWNKhKDKrx71NWFW7o1a+Y+ROB/z/bNue4k3V:E15yC5Ij/xINKhCKr4CmDY+RK/z/Kk
Static task
static1
Behavioral task
behavioral1
Sample
fd6989c90587630a61d42a4bbe2cd796a8e0eb6c5c15f813c440b00d416863ee.exe
Resource
win7-20231129-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.campoysl.com - Port:
587 - Username:
[email protected] - Password:
Mataro2024! - Email To:
[email protected]
Targets
-
-
Target
fd6989c90587630a61d42a4bbe2cd796a8e0eb6c5c15f813c440b00d416863ee
-
Size
787KB
-
MD5
e5ad7958e87bbe382c5c252222c14664
-
SHA1
639f3cfa46e5e53e449ce691a49b9f5924e9b0ba
-
SHA256
fd6989c90587630a61d42a4bbe2cd796a8e0eb6c5c15f813c440b00d416863ee
-
SHA512
13d03c03942781746845faa032fed125c717cbd72843fe4dae63f2cac27e8afaa25cc427bf379cc950d17b5648e12bbd3c98bcd218f14c7fb3f105415fb12170
-
SSDEEP
12288:ex/2iNPyCK2xrOonIXzEzgAWizmWNKhKDKrx71NWFW7o1a+Y+ROB/z/bNue4k3V:E15yC5Ij/xINKhCKr4CmDY+RK/z/Kk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-