General
-
Target
09a05f539ec775eae392cd5635963507bb9fff8ab855fd2481bdd687b8d2cf08
-
Size
597KB
-
Sample
240628-b875msxdql
-
MD5
5c7e470a7891dd49bdf0fc5aca3a3dd1
-
SHA1
2b86e6335430b90d2b676f98d1d620c3fc6c6057
-
SHA256
09a05f539ec775eae392cd5635963507bb9fff8ab855fd2481bdd687b8d2cf08
-
SHA512
63e894b6bf0e8e3ce0007eb87383381b6c1a93dba64ea1fecb0cd11fb37c58d95f8343ff065ca2f281f47463e57812cd2125d9ae44af99713cd8999e9775633a
-
SSDEEP
12288:oq9Ok8KhU2RmHIa4u8bDrlB2KCNk1c5E8sPxX0V0F5upBQFvrdTuX:19JDt4HIa1Kpi8cGPxX0VlIt4X
Static task
static1
Behavioral task
behavioral1
Sample
Mould clamp bolts quotation.exe
Resource
win7-20240611-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
UTjMgxC7qqqqG5651@@ - Email To:
[email protected]
Targets
-
-
Target
Mould clamp bolts quotation.exe
-
Size
652KB
-
MD5
2c9ada063e59aa030e6bcffe5905660a
-
SHA1
1b64074fb0fce4d6c490ca149c2231ebb16d44ad
-
SHA256
67522f9195f70de8b7a1cd137f3dcd7d751187071bb3fca9ebf58ad60f099533
-
SHA512
a65cb2234f7769265fdadcf00ef2d3114671531ea9f46a5524be4bc12baace46ded4cce0be36fa4fbf9e3ffc8670d0557940e9634eaa015788819f64926ab00f
-
SSDEEP
12288:o99glh3nbCaw89gkyKhkdmpIwCu8bxrll2KwNkdc5yUSnxl0b0F5ehzr5Q:oUw89jRkcpIwrQp06c6nxl0b/PQ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-