General
-
Target
b1c62d80debeea31ee00cbe0b96f33c8bbdb9bee1913729e3e6c35ed122012a5.zip
-
Size
182KB
-
Sample
250228-d1ybksyyhx
-
MD5
677d28fa7c97d5dedf04560533915671
-
SHA1
ef745c52bcd78bb57901501221c9e20fc45d4b22
-
SHA256
b1c62d80debeea31ee00cbe0b96f33c8bbdb9bee1913729e3e6c35ed122012a5
-
SHA512
ce66437ebe0a0260e1060bdef73bb2e89269320a802b6d5382c8a36c6b4d18492d1c37d63199e48119faccd2bc35e7e4045aedd8cdb0acfa67fbc0eb93259160
-
SSDEEP
3072:uPfTUHgBcUq/0BYdzEoj2jZ6B+KiCiuQUgi6F7aKVNerpNdJcVhJs9ED+N1fZwVC:LHg+lAoGZ6m5repN4VhaWD+NiDQbqdg
Static task
static1
Behavioral task
behavioral1
Sample
Eaton PO-45150292964.exe
Resource
win7-20241023-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Targets
-
-
Target
Eaton PO-45150292964.com
-
Size
517KB
-
MD5
0f58a33e105581cba508d8b64292ab5b
-
SHA1
4b609cb3ebb060e061910314628cbc4c97bc70cd
-
SHA256
b0ecb10600765efc1d81716094fddcaeb964ac35c9140b466dbbf5d147b8c53f
-
SHA512
2d70bc0fef5e21bf5b05deafa89420fec020eae6b304fd9a05da42fa29f721c1264f1a755d6558df7c5fc6adea9da9649d4d2ab7da07e5e2880c076e55d2d2ac
-
SSDEEP
12288:34RU6GHsHHziiQA2g5Tm2zKjCi/Qz0G63KlcG:3FI5Kmi/Hl29
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Suspicious use of SetThreadContext
-