General
-
Target
fe7e4fad0465e0981d2a6bc4bd6c3ea478aeb828f963113cbf6d86dd29c1bf7a
-
Size
705KB
-
Sample
240719-bw7y4swfqk
-
MD5
31cb8959556fee6da7bf47bd5955bbec
-
SHA1
baf2ae4f900d3fb2ae02a09d8b8a7e5df5fb0823
-
SHA256
fe7e4fad0465e0981d2a6bc4bd6c3ea478aeb828f963113cbf6d86dd29c1bf7a
-
SHA512
a490eb911285294df2ef7338218d98f0b20c14586dda67b357002f00ca7927022d00fccb369fd6ddcd7640a11b0385e78e089dab17f2c567c0374065b34777fc
-
SSDEEP
12288:wbyi2x14+GB99rOmY3rf5kx4wNtGp43TqiaqhflgbYARaWJ1sn52QJqQdRlF6wWy:naB78hkywrj3miaqhfl2YARPc52QJ/RN
Static task
static1
Behavioral task
behavioral1
Sample
fe7e4fad0465e0981d2a6bc4bd6c3ea478aeb828f963113cbf6d86dd29c1bf7a.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.espetss.com - Port:
587 - Username:
[email protected] - Password:
误®cWsqnPt®BRTZ29zM错 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.espetss.com - Port:
587 - Username:
[email protected] - Password:
误®cWsqnPt®BRTZ29zM错
Targets
-
-
Target
fe7e4fad0465e0981d2a6bc4bd6c3ea478aeb828f963113cbf6d86dd29c1bf7a
-
Size
705KB
-
MD5
31cb8959556fee6da7bf47bd5955bbec
-
SHA1
baf2ae4f900d3fb2ae02a09d8b8a7e5df5fb0823
-
SHA256
fe7e4fad0465e0981d2a6bc4bd6c3ea478aeb828f963113cbf6d86dd29c1bf7a
-
SHA512
a490eb911285294df2ef7338218d98f0b20c14586dda67b357002f00ca7927022d00fccb369fd6ddcd7640a11b0385e78e089dab17f2c567c0374065b34777fc
-
SSDEEP
12288:wbyi2x14+GB99rOmY3rf5kx4wNtGp43TqiaqhflgbYARaWJ1sn52QJqQdRlF6wWy:naB78hkywrj3miaqhfl2YARPc52QJ/RN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-