General
-
Target
DOC.exe
-
Size
766KB
-
Sample
200717-mrpldst6xe
-
MD5
c7685d6c04940a9a9bdce7645ad5121d
-
SHA1
352ad790c8582959f43c453d4918f02a0333afdc
-
SHA256
0c39b4af77c7279bf8a36e9e337f0ca1af96ca31c1fda5599c5dc8183118e54c
-
SHA512
71ddb906085282566d41c2527a721013349e4c7df6cfd676584c03702c789d9313dcb1363679af78ce57123129491bb657c9c60c34cda262fe0ff4d05140ea61
Static task
static1
Behavioral task
behavioral1
Sample
DOC.exe
Resource
win7
Behavioral task
behavioral2
Sample
DOC.exe
Resource
win10
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aquariuslogistics.com - Port:
587 - Username:
[email protected] - Password:
AQL@2019#$
Targets
-
-
Target
DOC.exe
-
Size
766KB
-
MD5
c7685d6c04940a9a9bdce7645ad5121d
-
SHA1
352ad790c8582959f43c453d4918f02a0333afdc
-
SHA256
0c39b4af77c7279bf8a36e9e337f0ca1af96ca31c1fda5599c5dc8183118e54c
-
SHA512
71ddb906085282566d41c2527a721013349e4c7df6cfd676584c03702c789d9313dcb1363679af78ce57123129491bb657c9c60c34cda262fe0ff4d05140ea61
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-