General
-
Target
5dda08c4efdce4925825f713a711f904175435cb4851e24ff67365d63f891f86.exe
-
Size
636KB
-
Sample
240618-vmxlkasdjc
-
MD5
062db577d710e0919eb99cde5839735a
-
SHA1
bc28ede5332e48ac0be1adc989e7ebe74ec4e490
-
SHA256
5dda08c4efdce4925825f713a711f904175435cb4851e24ff67365d63f891f86
-
SHA512
4cc726cd5b01e6c1830e06e23a26a2d6b7c60a5c71ca2b12712f8d090e12f1c02ae0fbcad05f9f58b608cc570c05c71b7c0b0f8565f70579295d88e0d3674353
-
SSDEEP
12288:5Z/iFIsPAb/z/5YibqWOPU0z71dpcFkksZk9OGSwn9CAKEA8fEDo/:rkIKybRYqfaZP7+9sgOJTSfWo
Static task
static1
Behavioral task
behavioral1
Sample
5dda08c4efdce4925825f713a711f904175435cb4851e24ff67365d63f891f86.exe
Resource
win7-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.alfainterplast.com.ua - Port:
587 - Username:
[email protected] - Password:
pay2024password$$ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.alfainterplast.com.ua - Port:
587 - Username:
[email protected] - Password:
pay2024password$$
Targets
-
-
Target
5dda08c4efdce4925825f713a711f904175435cb4851e24ff67365d63f891f86.exe
-
Size
636KB
-
MD5
062db577d710e0919eb99cde5839735a
-
SHA1
bc28ede5332e48ac0be1adc989e7ebe74ec4e490
-
SHA256
5dda08c4efdce4925825f713a711f904175435cb4851e24ff67365d63f891f86
-
SHA512
4cc726cd5b01e6c1830e06e23a26a2d6b7c60a5c71ca2b12712f8d090e12f1c02ae0fbcad05f9f58b608cc570c05c71b7c0b0f8565f70579295d88e0d3674353
-
SSDEEP
12288:5Z/iFIsPAb/z/5YibqWOPU0z71dpcFkksZk9OGSwn9CAKEA8fEDo/:rkIKybRYqfaZP7+9sgOJTSfWo
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-