General
-
Target
cb00bcbda04d9001fba05a6328307421c27b18ff9b34d7083ed431c1002ccb7c
-
Size
58KB
-
Sample
250423-ay52vswjz6
-
MD5
21c5c759ad119c1b7c18f8b4a1e1c522
-
SHA1
946668cc165142b968bb73009eb3a27f93626d21
-
SHA256
cb00bcbda04d9001fba05a6328307421c27b18ff9b34d7083ed431c1002ccb7c
-
SHA512
03a0a14c271960d0cde959f20e55f1d52d2438b0940e5916d34d51cc3927dc2988e856e21a51adf479ffb1b07a9f4017a8f346cc6644cc3dfde881e643eaad21
-
SSDEEP
1536://kGAZTIqSWq6zONu+xIylEEvOxyyBLA8Jv3nLOp:cqWq6zONuV/EvOyyBLA2vXLOp
Static task
static1
Behavioral task
behavioral1
Sample
Tiajin Haizhi PO 1509 ETA Sydney ASAP.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Targets
-
-
Target
Tiajin Haizhi PO 1509 ETA Sydney ASAP.com
-
Size
117KB
-
MD5
9ea6b17348de29490d2ddcd0fc0f9233
-
SHA1
b5adf8fdd81c676b6e3a04d3aaba364af496dc26
-
SHA256
d346f457f38f941258addcc492783f9ec111c7230bb74ed4a0bb8992bf0c61fd
-
SHA512
af8100b14220834c14248b1f82f8be6d6506fb2ed74b9cf00e769c7f7663b64ad38d40bf17c7ad479022aae426005b1c641cfbf1d2fc2a7dba6bfd07b044ac5f
-
SSDEEP
3072:SPCJ6uhiPIhZxE8uIMNHPPK6Gs1U+W0ZBUQnIrL:RTKHPPIYtZBd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-