General
-
Target
Specifications Tender Drawings and Technical Data.exe
-
Size
555KB
-
Sample
200716-ad82vsd212
-
MD5
87602c587f1e8a6edfefd4104a779744
-
SHA1
eaef5987fb405402c829e0675e5933fee638efe7
-
SHA256
22d92e9b0441722e2eec1d718cfbc78036132d57b15ec9ab1a84170cd1633efe
-
SHA512
02954edd27a92f366a703972557040b3756811a7bfd1e1972a14b9817617c1e092b40325c7c754cd20a25299633cf4f29657bb353f061e5564d9b4e56fed5244
Static task
static1
Behavioral task
behavioral1
Sample
Specifications Tender Drawings and Technical Data.exe
Resource
win7
Behavioral task
behavioral2
Sample
Specifications Tender Drawings and Technical Data.exe
Resource
win10v200430
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.flowtech-eng.net - Port:
587 - Username:
[email protected] - Password:
RKZtqmQ*#1
Targets
-
-
Target
Specifications Tender Drawings and Technical Data.exe
-
Size
555KB
-
MD5
87602c587f1e8a6edfefd4104a779744
-
SHA1
eaef5987fb405402c829e0675e5933fee638efe7
-
SHA256
22d92e9b0441722e2eec1d718cfbc78036132d57b15ec9ab1a84170cd1633efe
-
SHA512
02954edd27a92f366a703972557040b3756811a7bfd1e1972a14b9817617c1e092b40325c7c754cd20a25299633cf4f29657bb353f061e5564d9b4e56fed5244
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-