General
-
Target
D6GEVBNNH11111.exe
-
Size
625KB
-
Sample
220726-yktcxadfcn
-
MD5
9cef8265c679bafb06f885678ceab7bd
-
SHA1
ac7faaa7e8439951eaafd8e02007f33a555cd01b
-
SHA256
18f7c9fcf55206644996038b2908aa3871e3ea9affa4c6d62a7460f5b95cca90
-
SHA512
ab176b5348a6a69752eb9e47e2ed11f5130a02104f38932f6f88058bed797e0ab8ffabe665c353ba174788cf60d3114961554ce41bef850c4161cc9316451533
Static task
static1
Behavioral task
behavioral1
Sample
D6GEVBNNH11111.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
D6GEVBNNH11111.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
Protocol: smtp- Host:
multimetals.cfd - Port:
587 - Username:
logs@multimetals.cfd - Password:
logs@multimetals.cfd
Extracted
agenttesla
Protocol: smtp- Host:
multimetals.cfd - Port:
587 - Username:
application/x-www-form-urlencoded - Password:
logs@multimetals.cfd - Email To:
asset@multimetals.cfd
Targets
-
-
Target
D6GEVBNNH11111.exe
-
Size
625KB
-
MD5
9cef8265c679bafb06f885678ceab7bd
-
SHA1
ac7faaa7e8439951eaafd8e02007f33a555cd01b
-
SHA256
18f7c9fcf55206644996038b2908aa3871e3ea9affa4c6d62a7460f5b95cca90
-
SHA512
ab176b5348a6a69752eb9e47e2ed11f5130a02104f38932f6f88058bed797e0ab8ffabe665c353ba174788cf60d3114961554ce41bef850c4161cc9316451533
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-