General
-
Target
Shipping Documents P.LIST &Bill of Laden.exe
-
Size
444KB
-
Sample
200707-sgexc5klre
-
MD5
71f0228d2efec9fdfa5924238877631b
-
SHA1
88798dab1ba2e06b8860c3c927687ebc86440433
-
SHA256
135c264ce4a709eedd0f971cec5eebb546c9c31e84730793fec5552a6886f7c9
-
SHA512
18ec4731a99674df616d07adb11530a91902d18c90389c4a5776a1248a61298ee11ec4c2fe17118d084fb9a18f081bdcea3a3930ed87ea94f39eb84a9587b949
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents P.LIST &Bill of Laden.exe
Resource
win7
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.radianthospitals.org - Port:
587 - Username:
[email protected] - Password:
radiant2016
Targets
-
-
Target
Shipping Documents P.LIST &Bill of Laden.exe
-
Size
444KB
-
MD5
71f0228d2efec9fdfa5924238877631b
-
SHA1
88798dab1ba2e06b8860c3c927687ebc86440433
-
SHA256
135c264ce4a709eedd0f971cec5eebb546c9c31e84730793fec5552a6886f7c9
-
SHA512
18ec4731a99674df616d07adb11530a91902d18c90389c4a5776a1248a61298ee11ec4c2fe17118d084fb9a18f081bdcea3a3930ed87ea94f39eb84a9587b949
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-