General
-
Target
a4e7834dd7b5a9ad0800510ec96ab42d6f2e92000d404d29547e3548576680a9
-
Size
693KB
-
Sample
241119-bvp2xatlek
-
MD5
fea416753d1b8fd9ae796bce7101957a
-
SHA1
d8217cc39d12653d5d31e605283e13a573574993
-
SHA256
a4e7834dd7b5a9ad0800510ec96ab42d6f2e92000d404d29547e3548576680a9
-
SHA512
43c210031e95f6bc4136f1e3cb1d1b0b4520b7a404f3e34c8b2e07ccdd3e679bca15d2f60d06c6e8db4f6cbaa128e2aa558ce2be68231465d651697d336a3783
-
SSDEEP
12288:+5oyMX9Tu6i2hAOfD9kIFIoqFhaDtYjmgZ7K40R+Szu/6XPbINhhlTy:+5oyMN8KKIuThaRYagFKbR+SG6X+z
Static task
static1
Behavioral task
behavioral1
Sample
a4e7834dd7b5a9ad0800510ec96ab42d6f2e92000d404d29547e3548576680a9.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
graceofgod@amen - Email To:
[email protected]
Targets
-
-
Target
a4e7834dd7b5a9ad0800510ec96ab42d6f2e92000d404d29547e3548576680a9
-
Size
693KB
-
MD5
fea416753d1b8fd9ae796bce7101957a
-
SHA1
d8217cc39d12653d5d31e605283e13a573574993
-
SHA256
a4e7834dd7b5a9ad0800510ec96ab42d6f2e92000d404d29547e3548576680a9
-
SHA512
43c210031e95f6bc4136f1e3cb1d1b0b4520b7a404f3e34c8b2e07ccdd3e679bca15d2f60d06c6e8db4f6cbaa128e2aa558ce2be68231465d651697d336a3783
-
SSDEEP
12288:+5oyMX9Tu6i2hAOfD9kIFIoqFhaDtYjmgZ7K40R+Szu/6XPbINhhlTy:+5oyMN8KKIuThaRYagFKbR+SG6X+z
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-