General
-
Target
d0f96b0b6183e3187efd5bc7e3c301d486a4f5c04265d95198ce32f1537e3f72.unknown
-
Size
659KB
-
Sample
240925-c2bcrszekm
-
MD5
6afb88566ca38e9dd868bda2422b435b
-
SHA1
b5e0a33f0363115b24512350263d99eb8af775eb
-
SHA256
d0f96b0b6183e3187efd5bc7e3c301d486a4f5c04265d95198ce32f1537e3f72
-
SHA512
ec2aa3d98b26110974ab849196c23cade2acb96afc1f77394d3ac009e93f5ddfc5d11f857595e039f0caeb3db12212dab926e4672e8873a712438ede04934480
-
SSDEEP
12288:jOjsJrm2DORelTAeZjqjhazCtH42QWkn5IxQMj7RYLgXeevG3j8bQb:jWsJrm2DO0TvqH42ZLuMj7GEXze3UI
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice.scr
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
BIGNAIRA2024 - Email To:
[email protected]
Targets
-
-
Target
Payment Advice.scr
-
Size
657KB
-
MD5
05971e8521240cd588015e689baab4b7
-
SHA1
1911d514d8e9d3310b2876ee591553250a31f44f
-
SHA256
d71f85d32dd19dd5a0c5ad3b97c3eba3277a5966035970a2c9ea7dd8e23fafa3
-
SHA512
01db290b831f6e60efaa8bfeb8bb0e1f1137c7843b29da34f024ee6e4f4b2f341ed4f8f2ed7c1a202a7a99781224bfca8bbaf7479ba23796707fc3d0d9994448
-
SSDEEP
12288:pOjsJrm2DORelTAeZjqjhazCtH42QWkn5IxQMj7RYLgXeevG3j8bQb:pWsJrm2DO0TvqH42ZLuMj7GEXze3UI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-