General
-
Target
01623046d87fa76ea3f656370cd71a69c7f53dfa3d9bc8aa379ea12f43b6dde4
-
Size
747KB
-
Sample
250124-bmjvxstqam
-
MD5
02786bcac1e68f432a07866844b0fc16
-
SHA1
74c1c6618d49793e70f0e6221aa844b221dd28bf
-
SHA256
01623046d87fa76ea3f656370cd71a69c7f53dfa3d9bc8aa379ea12f43b6dde4
-
SHA512
932c2ed9ca4848c954d6507811e3f0bc38661cac4d77d5daec42a1712a3f23f8a736a2f774f18b310eb40edf85d58e782e7864a5dd976c9e9124605a636aa48b
-
SSDEEP
12288:nDFtN/ybfNTlLJpgxDchlzbMvs5s4tPh0RLZOi72F:nDdOjVpiEhX5s4C9a
Static task
static1
Behavioral task
behavioral1
Sample
01623046d87fa76ea3f656370cd71a69c7f53dfa3d9bc8aa379ea12f43b6dde4.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.magnatextile.com - Port:
587 - Username:
[email protected] - Password:
ow%{&}mti{&}$is - Email To:
[email protected]
Targets
-
-
Target
01623046d87fa76ea3f656370cd71a69c7f53dfa3d9bc8aa379ea12f43b6dde4
-
Size
747KB
-
MD5
02786bcac1e68f432a07866844b0fc16
-
SHA1
74c1c6618d49793e70f0e6221aa844b221dd28bf
-
SHA256
01623046d87fa76ea3f656370cd71a69c7f53dfa3d9bc8aa379ea12f43b6dde4
-
SHA512
932c2ed9ca4848c954d6507811e3f0bc38661cac4d77d5daec42a1712a3f23f8a736a2f774f18b310eb40edf85d58e782e7864a5dd976c9e9124605a636aa48b
-
SSDEEP
12288:nDFtN/ybfNTlLJpgxDchlzbMvs5s4tPh0RLZOi72F:nDdOjVpiEhX5s4C9a
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-