General
-
Target
TT DOC SWIFT _679388 190617_2019-NLCIV000003576_ES146009_30309679.z
-
Size
393KB
-
Sample
200710-mkdqetj9pj
-
MD5
ddcc56e982f2e02918ccd8eef98258f8
-
SHA1
a2d2d0b1d1ad1d177f0468ad8926eb71894ae59b
-
SHA256
1e87b346a773fe66f829b839da905860c6ae765e5f09d1d5ed19613fdf08c1ac
-
SHA512
13760594300ae06c5d60f6434daf1dd209b7ee16ec2cce1f95841637df77bfff7f8a5a17bf9380c6d418d68403cbec66facb5597382fe234a885734828f71dc7
Static task
static1
Behavioral task
behavioral1
Sample
TT DOC SWIFT _679388 190617_2019-NLCIV000003576_ES146009_30309679.exe
Resource
win7
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.rebu.co.rw/ - Port:
21 - Username:
[email protected] - Password:
o^Z0CIU?^yL2
Protocol: ftp- Host:
ftp://ftp.rebu.co.rw/ - Port:
21 - Username:
[email protected] - Password:
o^Z0CIU?^yL2
Targets
-
-
Target
TT DOC SWIFT _679388 190617_2019-NLCIV000003576_ES146009_30309679.exe
-
Size
432KB
-
MD5
b5c7a29264b4d054fa8ab1833b6f5db5
-
SHA1
0b59c38fcdefff646150d48e8d5f3a7e60a5f0f1
-
SHA256
a5ffa8a9df04f5c586bcfa6b8a66b84e9709b248b5832fabaf192a52695938c3
-
SHA512
af653383a85111f545974fa872a4827067acdab1caddc4cbfcc1f111cd1a11182370b72e7703318f915ca05f2f1da7241052048b1442c6e483cbe5bb0f3023a0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-