General
-
Target
Recibo da TNT shipping.exe
-
Size
814KB
-
Sample
201107-sllx5tjcxs
-
MD5
a39eb134c963ff450009962b24819629
-
SHA1
fcd967ab2afd3c0dc91cbe43a5112e8caf423c80
-
SHA256
cf0bad09c814bb64da93ebdb2ef5830c3b83e5106ae967e2155ebae2f2c63cc3
-
SHA512
bb11ca3beadd2f007005c45b85bcc1107f4f238100606bf885636839c4e2ab685a2d00cb7aebb040e2759f075de1cde1ff402a15b5c81eec01f07db699871993
Static task
static1
Behavioral task
behavioral1
Sample
Recibo da TNT shipping.exe
Resource
win7v20201028
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cosur.pe - Port:
587 - Username:
[email protected] - Password:
C0m3rc14l%
Targets
-
-
Target
Recibo da TNT shipping.exe
-
Size
814KB
-
MD5
a39eb134c963ff450009962b24819629
-
SHA1
fcd967ab2afd3c0dc91cbe43a5112e8caf423c80
-
SHA256
cf0bad09c814bb64da93ebdb2ef5830c3b83e5106ae967e2155ebae2f2c63cc3
-
SHA512
bb11ca3beadd2f007005c45b85bcc1107f4f238100606bf885636839c4e2ab685a2d00cb7aebb040e2759f075de1cde1ff402a15b5c81eec01f07db699871993
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-