General
-
Target
New P.O. for W2025_1.7z
-
Size
23KB
-
Sample
250121-r6g4faynbt
-
MD5
668c8cf2b6d221f3fb0e472c43c2e0ad
-
SHA1
b66cb15e6f10848596c1e394880fd59d353963aa
-
SHA256
6f0422e5a570762ba580fdad6e8d25e650190d859eda740bc5c4f454e91f5e26
-
SHA512
2772720096bcc1323c1eee9d73a57d9aaaef9806a64092bf6d2d1b0502579d4385613ff0e454a4961e793beaad18c25beb0280c6971fd33c0887f2b8782a1fe5
-
SSDEEP
384:uwq/KYwGYmp7zoMQIJ6EIoS+Nlwv7zMz2ffP29M2spHtC4mHXx4MYvjfESWi0:uwXUYY7zBQIJ6HoS+Nuzgz2f2i2spM4I
Static task
static1
Behavioral task
behavioral1
Sample
New P.O. for W2025.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Targets
-
-
Target
New P.O. for W2025.com
-
Size
46KB
-
MD5
d3c8de4b00030ddd7f5c9c6eb40f7e49
-
SHA1
446acf91a2987bba28abc7839be81bf739a7112f
-
SHA256
f6f3fe1f44d606a8c717d7ce911207c259a1f8844503e7513e99cc78a458d8cf
-
SHA512
7a81499335703ee05d98584a5a7d5c15a535a6e329710779f1dc53b21ed48f13200dd51d8d77652254947c6bf2a9b89874815d02c47937172dba418400c3c8da
-
SSDEEP
768:JMtp801KTj7nzeUwx5al8FO3+HLoRn73F/oP67+tSwHF2A:mtp801CrCjpFHHM1rFCzIwl3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Suspicious use of SetThreadContext
-