General
-
Target
eec0ae35358884d0570ac828cf3c6b1bb437335503b93c413042ef7f2f480ee6
-
Size
893KB
-
Sample
240616-bp4ccatbpf
-
MD5
520de8b9a99e8f8d29e983910ce4dac2
-
SHA1
4818b508a298814e98698bb504bc26bf69bf4976
-
SHA256
eec0ae35358884d0570ac828cf3c6b1bb437335503b93c413042ef7f2f480ee6
-
SHA512
aae54cd7729fee05c1aa2bd7610c641c8cc6336c8b8abf8e9e210af5561ce702c43eb3e815f8b0451e62387c3b7466cad30bf4ae225654973fa4def04a40264e
-
SSDEEP
24576:6OFg1l771DIjJ69sQnv+yBQtjuzR8ug+5:xFg1lhk49Hvv2juzR
Static task
static1
Behavioral task
behavioral1
Sample
eec0ae35358884d0570ac828cf3c6b1bb437335503b93c413042ef7f2f480ee6.exe
Resource
win7-20240611-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.usgrovemall.com - Port:
587 - Username:
[email protected] - Password:
Maximzed@#$# - Email To:
[email protected]
Targets
-
-
Target
eec0ae35358884d0570ac828cf3c6b1bb437335503b93c413042ef7f2f480ee6
-
Size
893KB
-
MD5
520de8b9a99e8f8d29e983910ce4dac2
-
SHA1
4818b508a298814e98698bb504bc26bf69bf4976
-
SHA256
eec0ae35358884d0570ac828cf3c6b1bb437335503b93c413042ef7f2f480ee6
-
SHA512
aae54cd7729fee05c1aa2bd7610c641c8cc6336c8b8abf8e9e210af5561ce702c43eb3e815f8b0451e62387c3b7466cad30bf4ae225654973fa4def04a40264e
-
SSDEEP
24576:6OFg1l771DIjJ69sQnv+yBQtjuzR8ug+5:xFg1lhk49Hvv2juzR
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-