General
-
Target
66326d86d9311534e5c79809a6a9c54f34f87b8c31756112a82d4cb5a8f47d4a
-
Size
659KB
-
Sample
250109-dwqe6symgn
-
MD5
1bbca7177614b854900d6123fe879051
-
SHA1
25d7915cfc1b32ed5c1fd1020aa172ce1e1e4b8e
-
SHA256
66326d86d9311534e5c79809a6a9c54f34f87b8c31756112a82d4cb5a8f47d4a
-
SHA512
b738bb2825f2908ace8807c3e2e6f8584263aca46c12c0e5cdc05e602cad1895a8638fd4efd031b0994fb16ca6beac1a80b2ef74f282a7ff8dc150618e478b15
-
SSDEEP
12288:IuEbKtefdef13b0Undd/YPKponellWNwmjJDvn3HTYtTQaxUzdrFdwdIjWWyZ:/EbKtHf1L0mddJuesNxjJL3HTYbxUzdq
Static task
static1
Behavioral task
behavioral1
Sample
New order.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9 - Email To:
[email protected]
Targets
-
-
Target
New order.exe
-
Size
786KB
-
MD5
08d7fbb6862dcb82dc8cde80068db6c3
-
SHA1
86d0b5b41b9061d27e09571e5569e1eb62552367
-
SHA256
d560c0f26753eba85047f309ddc73797dc7b3c7e14d9b0328eaead50ef7c1338
-
SHA512
06e1e9b676af40fdc7eec3aafd6a7b057b44616c0117e09a05d9351fd3811ac0c440fc9c5b5b03d8d52fe882af47253137d3c5d7e02ddca067ca1f316f040a32
-
SSDEEP
24576:72T8S0ck7WVwEddb0euZ5P13lbTYDRWzHrXN9q:7E8S0cd62nu71lbc4zbLq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-