General
-
Target
inquiry.vbs
-
Size
94KB
-
Sample
241001-xbchcsyblh
-
MD5
5244eee364836dc693025ecf574f394d
-
SHA1
2e9dcc09dcae233d7bd7507a3685fd67e9d9c158
-
SHA256
c3cd0879f2fd7d6329b64dce87249fd717145625e60bce03eb67f9ee2c8a10db
-
SHA512
f29ace7bc68fa083606e6f0be5f697d92ec93fd936a85cc8bf6ce4511741b0e9d921cf92dfcd11ecf2de28bbde49e651c234db3d6c3a22baefacad7d09ff1585
-
SSDEEP
1536:SpAqmnwlpbjrWic4dYWN3xHEQPplcJGH8O+iPG707Q/gsUogUwnZI3:SpAqCwlpbjrHFYWBxHEQdcpiE07Q/gsj
Static task
static1
Behavioral task
behavioral1
Sample
inquiry.vbs
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
marcellinus360 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
marcellinus360
Targets
-
-
Target
inquiry.vbs
-
Size
94KB
-
MD5
5244eee364836dc693025ecf574f394d
-
SHA1
2e9dcc09dcae233d7bd7507a3685fd67e9d9c158
-
SHA256
c3cd0879f2fd7d6329b64dce87249fd717145625e60bce03eb67f9ee2c8a10db
-
SHA512
f29ace7bc68fa083606e6f0be5f697d92ec93fd936a85cc8bf6ce4511741b0e9d921cf92dfcd11ecf2de28bbde49e651c234db3d6c3a22baefacad7d09ff1585
-
SSDEEP
1536:SpAqmnwlpbjrWic4dYWN3xHEQPplcJGH8O+iPG707Q/gsUogUwnZI3:SpAqCwlpbjrHFYWBxHEQdcpiE07Q/gsj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-