General
-
Target
5f9f0e53fa5299fa4c4216599552a09f2716980e5b93c2b2f44d733edae22214
-
Size
683KB
-
Sample
250110-bs68eayrcm
-
MD5
a3fd394b9b762ab43abb39b1a5b446cc
-
SHA1
f093b17b78f7006e7d4a141a4c458bd1edbb484b
-
SHA256
5f9f0e53fa5299fa4c4216599552a09f2716980e5b93c2b2f44d733edae22214
-
SHA512
1318ddd4aa37569781dea8aa0c255850ea2fb8338027cf91fc96df995dfca930a42d8df701b7110e9ff5ed7a04bdee06f6f98c3e2fa64a5ae011a2ad7cc30772
-
SSDEEP
6144:iDW1ow4tsJ6vI7/+FK8xvfz1BmTlKkkoHq6EqZmBhk0xHM9C4y:iiuI7/+1xpBmtHIQ6htK9CT
Static task
static1
Behavioral task
behavioral1
Sample
5f9f0e53fa5299fa4c4216599552a09f2716980e5b93c2b2f44d733edae22214.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5f9f0e53fa5299fa4c4216599552a09f2716980e5b93c2b2f44d733edae22214.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
@infinitY1234
Targets
-
-
Target
5f9f0e53fa5299fa4c4216599552a09f2716980e5b93c2b2f44d733edae22214
-
Size
683KB
-
MD5
a3fd394b9b762ab43abb39b1a5b446cc
-
SHA1
f093b17b78f7006e7d4a141a4c458bd1edbb484b
-
SHA256
5f9f0e53fa5299fa4c4216599552a09f2716980e5b93c2b2f44d733edae22214
-
SHA512
1318ddd4aa37569781dea8aa0c255850ea2fb8338027cf91fc96df995dfca930a42d8df701b7110e9ff5ed7a04bdee06f6f98c3e2fa64a5ae011a2ad7cc30772
-
SSDEEP
6144:iDW1ow4tsJ6vI7/+FK8xvfz1BmTlKkkoHq6EqZmBhk0xHM9C4y:iiuI7/+1xpBmtHIQ6htK9CT
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
System Binary Proxy Execution: InstallUtil
Abuse InstallUtil to proxy execution of malicious code.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-