General
-
Target
4bb2f623b8e05072ed01e7fd0e9a4e28.bin
-
Size
1.6MB
-
Sample
241117-blh71asjfq
-
MD5
c5033340d401fddcb1fa3c4f75b4b78e
-
SHA1
5c6f23ea6a553da0729b71019beabcb0ba33d3d6
-
SHA256
8d23705a5d808402edeb91aedc87d7bd77ab30347e39df15d841728d843aec4d
-
SHA512
81ad9aa1cc565fe4f23f2e240eb11597b7299d8211c7d2076b8e224beb76d227a4fdb898a1ffa7ade2540e90b1d46cf6ac351d552e239b600dd01a974a978aea
-
SSDEEP
24576:LKsw5KXKOajm2yKGdbtryva36M3vbFJvMwC31NuVs2sB5BhfhkTFalY:LW5GKRHMbtrma36MfzMwxsv7JkF
Static task
static1
Behavioral task
behavioral1
Sample
929fbee164997ce91edddfa6eae72cad7afd11955480d2582bfdc964505ccea2.vbs
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
nffplp.com - Port:
587 - Username:
[email protected] - Password:
$Nke%8XIIDtm - Email To:
[email protected]
Targets
-
-
Target
929fbee164997ce91edddfa6eae72cad7afd11955480d2582bfdc964505ccea2.vbs
-
Size
2.2MB
-
MD5
4bb2f623b8e05072ed01e7fd0e9a4e28
-
SHA1
b53851e2fb8d9da46d05c813da5612a04e72242f
-
SHA256
929fbee164997ce91edddfa6eae72cad7afd11955480d2582bfdc964505ccea2
-
SHA512
b2740378d3d52935e8b3e52a6c4c74928de678dbf449a08796e2467cef341b03fe755132b4aaf4fa4a63428854a42749584acf779efce4340ab9c22cfca1e607
-
SSDEEP
49152:B20hVNq/RiQ4N+jRDSBTUxaWA/ZUgHYuhEBprt6:P+U
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-