General
-
Target
0.eml
-
Size
894KB
-
Sample
240618-jsq57atgqc
-
MD5
9a510d91e306d168ca7f3bea659da5f3
-
SHA1
8988997e6db253cbc1623745defa82d58865e58d
-
SHA256
a8922e65fd8276f0a9f0a0ebf2ce97c3ce521ebfb490d1c2db8a750b97979f7c
-
SHA512
7abb2ce8484122613579840d9ac265ca7b38167e3710a8b36d4a98bc77af5fa6cd56f60a03b39116ba66f800a3fb4883ab45347c1761619e7969f4630e472721
-
SSDEEP
12288:sbL0Cf7YnfSG25EzI0H9LE4rfsq5DMHdjY+C1T3u3VHiUrtqIGvKb2CfqPBDxk7Y:+0CQ3zBHK4rOV1C1CCjBZxk7VC
Static task
static1
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.kxnlaos.com - Port:
587 - Username:
[email protected] - Password:
eDe~fz;Cy0{W - Email To:
[email protected]
Targets
-
-
Target
DHL Package Documents clearance.exe
-
Size
690KB
-
MD5
06f29001ddc852a2880b8ece673ff24c
-
SHA1
f80a254ba85b9531da05c74a12a8235ef8a359a1
-
SHA256
87c68756481a2bbd821e8ac224087c5626ffdc1e05eaaeff506bb0b5148bba0b
-
SHA512
95020cd917b98919d3960090209bbd754739cc247ffd0497cbf0edd0142ab7c86d668f6617b9f47c8e375dc323508bb42d38fe2c44eca4b56524835e0b40527b
-
SSDEEP
12288:D2iNvFIsPAYDDNvkm7TuIQvQatxuJlV3D677qZAu+IPlatsXqdcW:D1DIK7DNvj7TuIQY3X3e7uZAuExdc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-