General
-
Target
Request Quotation.exe
-
Size
759KB
-
Sample
200717-f1m55d48n6
-
MD5
9fb2846dca4accdd1c4fcaf212e1c6f6
-
SHA1
b49cfbe4a19d7ab3ee7d1a33425ccc822bba3d2e
-
SHA256
d0b71fdf377abca1c191fedeab8311dac158632edb66f3b894166686d61bfad6
-
SHA512
9ae52ef0f49c06e650c2ede614b6ff5f3a2b6de5cc18b892c5cf72bd583a4919f160ad4c30cac8a126fdaf1e3066a7a674e471138dc70213268f597227e81616
Static task
static1
Behavioral task
behavioral1
Sample
Request Quotation.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
Request Quotation.exe
Resource
win10
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.varda.com.tr - Port:
587 - Username:
[email protected] - Password:
varda9997929
Targets
-
-
Target
Request Quotation.exe
-
Size
759KB
-
MD5
9fb2846dca4accdd1c4fcaf212e1c6f6
-
SHA1
b49cfbe4a19d7ab3ee7d1a33425ccc822bba3d2e
-
SHA256
d0b71fdf377abca1c191fedeab8311dac158632edb66f3b894166686d61bfad6
-
SHA512
9ae52ef0f49c06e650c2ede614b6ff5f3a2b6de5cc18b892c5cf72bd583a4919f160ad4c30cac8a126fdaf1e3066a7a674e471138dc70213268f597227e81616
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-