General
-
Target
088021ord_#PO.exe
-
Size
1.4MB
-
Sample
200715-3q7bqq6332
-
MD5
300ba4035c456e004ebd91feec81e2f2
-
SHA1
89aed8ca31e2c3ec2208d3b82151e13a2fdbf812
-
SHA256
96b854630806f4f57fa28534d9b478907db67c016bd606ba4b0d31af56f12d48
-
SHA512
86d61cec3d44a1b0b9aed4cfde05a79aaf3dd798280d96dec4f7f3acc8800a06ae9a57ce2373d4ff9926b9ea86e9c3f8879e1bf1ef376f3ff65de50941b93203
Static task
static1
Behavioral task
behavioral1
Sample
088021ord_#PO.exe
Resource
win7
Behavioral task
behavioral2
Sample
088021ord_#PO.exe
Resource
win10v200430
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aquariuslogistics.com - Port:
587 - Username:
[email protected] - Password:
AQL@2019#$
Targets
-
-
Target
088021ord_#PO.exe
-
Size
1.4MB
-
MD5
300ba4035c456e004ebd91feec81e2f2
-
SHA1
89aed8ca31e2c3ec2208d3b82151e13a2fdbf812
-
SHA256
96b854630806f4f57fa28534d9b478907db67c016bd606ba4b0d31af56f12d48
-
SHA512
86d61cec3d44a1b0b9aed4cfde05a79aaf3dd798280d96dec4f7f3acc8800a06ae9a57ce2373d4ff9926b9ea86e9c3f8879e1bf1ef376f3ff65de50941b93203
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-