General
-
Target
c9228f7c2591dfb8dfe00051f5333c1bb8d6a996091d3b5eea5f36a86599b626
-
Size
100KB
-
Sample
240710-bh9wjsxbmm
-
MD5
db16f5775e54cc49973a1cfd276ff6a0
-
SHA1
90991f44f34ce0ee48a054fbcbeb30156711ad0d
-
SHA256
c9228f7c2591dfb8dfe00051f5333c1bb8d6a996091d3b5eea5f36a86599b626
-
SHA512
94e80d945344fa808456df83ea16b4d8bf19823854be038c92d76b3eecd117ebafb3f717314c9eb343935a40492fea8f46f888bb872adf1a717d3222cf72f1cc
-
SSDEEP
1536:mC2a7OAoM7EdpKuCiZOIyf5NF7yXh5nPRoej7oNhuCtGN8ZA55:2ahECuCiXEF7yh5Puej06Hau55
Static task
static1
Behavioral task
behavioral1
Sample
c9228f7c2591dfb8dfe00051f5333c1bb8d6a996091d3b5eea5f36a86599b626.exe
Resource
win7-20240708-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.astramedikal.com - Port:
587 - Username:
[email protected] - Password:
muhasebe2020*
Extracted
agenttesla
Protocol: smtp- Host:
mail.astramedikal.com - Port:
587 - Username:
[email protected] - Password:
muhasebe2020* - Email To:
[email protected]
Targets
-
-
Target
c9228f7c2591dfb8dfe00051f5333c1bb8d6a996091d3b5eea5f36a86599b626
-
Size
100KB
-
MD5
db16f5775e54cc49973a1cfd276ff6a0
-
SHA1
90991f44f34ce0ee48a054fbcbeb30156711ad0d
-
SHA256
c9228f7c2591dfb8dfe00051f5333c1bb8d6a996091d3b5eea5f36a86599b626
-
SHA512
94e80d945344fa808456df83ea16b4d8bf19823854be038c92d76b3eecd117ebafb3f717314c9eb343935a40492fea8f46f888bb872adf1a717d3222cf72f1cc
-
SSDEEP
1536:mC2a7OAoM7EdpKuCiZOIyf5NF7yXh5nPRoej7oNhuCtGN8ZA55:2ahECuCiXEF7yh5Puej06Hau55
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-