General
-
Target
OUTSTANDING PAYMENTS.exe
-
Size
701KB
-
Sample
200716-e19624eq9a
-
MD5
545352c3b443c8d949fb9bf068be1aef
-
SHA1
0d7569043e0a6566a9680f77b82ffa32f322865f
-
SHA256
895caf8a32b031db037f0b3be265ebc5a909b4f1f1880a252795458a87bf1214
-
SHA512
b1a9c2e7649b927281d18ddf97313f0a08080dfadd5fe04d57379972ded48f6fbd0f319fbbcad712e1c13b301c87a1948ca225f37909d27f7d6a929a29009d50
Static task
static1
Behavioral task
behavioral1
Sample
OUTSTANDING PAYMENTS.exe
Resource
win7
Behavioral task
behavioral2
Sample
OUTSTANDING PAYMENTS.exe
Resource
win10v200430
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mdist.us - Port:
587 - Username:
[email protected] - Password:
Receiving#4321
Targets
-
-
Target
OUTSTANDING PAYMENTS.exe
-
Size
701KB
-
MD5
545352c3b443c8d949fb9bf068be1aef
-
SHA1
0d7569043e0a6566a9680f77b82ffa32f322865f
-
SHA256
895caf8a32b031db037f0b3be265ebc5a909b4f1f1880a252795458a87bf1214
-
SHA512
b1a9c2e7649b927281d18ddf97313f0a08080dfadd5fe04d57379972ded48f6fbd0f319fbbcad712e1c13b301c87a1948ca225f37909d27f7d6a929a29009d50
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-