General
-
Target
Bank Details.exe
-
Size
887KB
-
Sample
200708-e9wc8b388n
-
MD5
f225456e24d7141baf16fa70e19fef8a
-
SHA1
1c8c1786bf9278e6083c7da1c3c9404b007043bc
-
SHA256
c62691c81bf080e70b24824537d2abc3a88ff1c554b3c2d2727e06024712eefe
-
SHA512
d4974c435f3a1c5050a9758769d934ec53ef9c008b2a99f25cf96fe7fa731d498daf43e47aef00ccef1b0804b0ef57a0cd8853d9ce7ab2fe2fe36e0a43ff8647
Static task
static1
Behavioral task
behavioral1
Sample
Bank Details.exe
Resource
win7
Behavioral task
behavioral2
Sample
Bank Details.exe
Resource
win10v200430
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.threewaystoharems.com - Port:
587 - Username:
[email protected] - Password:
sales@123456
Targets
-
-
Target
Bank Details.exe
-
Size
887KB
-
MD5
f225456e24d7141baf16fa70e19fef8a
-
SHA1
1c8c1786bf9278e6083c7da1c3c9404b007043bc
-
SHA256
c62691c81bf080e70b24824537d2abc3a88ff1c554b3c2d2727e06024712eefe
-
SHA512
d4974c435f3a1c5050a9758769d934ec53ef9c008b2a99f25cf96fe7fa731d498daf43e47aef00ccef1b0804b0ef57a0cd8853d9ce7ab2fe2fe36e0a43ff8647
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-