General
-
Target
Order.exe
-
Size
604KB
-
Sample
200710-3md6sr6vb2
-
MD5
856bb59a00ebbb5fe4a3e73484631f17
-
SHA1
381ae99021cd1c7f84035b1d821f4bbca81487fd
-
SHA256
684eb557696d45ec516edbae21d19c390e4261aefab4dd87c1b01d2f12a36715
-
SHA512
6ea13fb9084009bb4e2aee4f58d3525d89053b0ba92e9744e67af8fa4cdde70207f56abc77a760c2287bab5dde5e575bacf177807f254bf473f8ecdad4096208
Static task
static1
Behavioral task
behavioral1
Sample
Order.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
Order.exe
Resource
win10
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.israelagroconsultant.com - Port:
587 - Username:
[email protected] - Password:
israelagro@123
Targets
-
-
Target
Order.exe
-
Size
604KB
-
MD5
856bb59a00ebbb5fe4a3e73484631f17
-
SHA1
381ae99021cd1c7f84035b1d821f4bbca81487fd
-
SHA256
684eb557696d45ec516edbae21d19c390e4261aefab4dd87c1b01d2f12a36715
-
SHA512
6ea13fb9084009bb4e2aee4f58d3525d89053b0ba92e9744e67af8fa4cdde70207f56abc77a760c2287bab5dde5e575bacf177807f254bf473f8ecdad4096208
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-