General
-
Target
80f69949550d327ea8bdcde4e40af0f8240d218920068164196af1505a881be7
-
Size
648KB
-
Sample
241009-qnxwhazemc
-
MD5
07c4444384ffe1f96f77e6c85b02b059
-
SHA1
c359b51cf26f8862967b50977a168fb3cfff4d16
-
SHA256
80f69949550d327ea8bdcde4e40af0f8240d218920068164196af1505a881be7
-
SHA512
1cf733278794e8647d12a789ce68b2e7fb33c6fa3ec59872b241b4343c10108d8ed67441f7eefdad5389beef992711ce1a0b6773e89f8d63b8291606b2dfa868
-
SSDEEP
12288:iCSnTK09UgAn4uLcqQbDY+kFn3+HHX7PuA9F6flQ4xTHh/jon:iC0v9TAn4uLHQw+kFn3+naA9FsHI
Static task
static1
Behavioral task
behavioral1
Sample
SOA-Sep24.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.usgrovemall.com - Port:
587 - Username:
[email protected] - Password:
Maximzed@#$# - Email To:
[email protected]
Targets
-
-
Target
SOA-Sep24.exe
-
Size
811KB
-
MD5
dec1aede826ff5b8ed6ae26778452996
-
SHA1
da1cc5dec36cd44e8cdbdc01c52138776dd67a39
-
SHA256
223b17b28b631da923ca472fc458645f286554be5032c7cf95ff6b8fce43b90e
-
SHA512
e36126053604d7b09d38955601bf194153d862df7cfd43df0438397f586af60e321db19df2ceda4cd87713397abb330b34d78d86912e02e3d3527812a62a5031
-
SSDEEP
12288:Qr4lwKEkWIIuVZ9dhnj+kLjpDpjaz1n4cvAj4FrqfabW/8nMYT4mE:WpKEkWKnBnj7+xvA4oaa/BcTE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-