General
-
Target
SOA_JAN_MAY_20_doc.exe
-
Size
500KB
-
Sample
201109-ffxva4yn2a
-
MD5
2e1a3f171e9adfb0cbd28a59a72409e3
-
SHA1
5a2b23a48bc746f333663baffbe9b8e166a72008
-
SHA256
dccf76439fbd7e0afbaf8b56edda49b8a842c4b9447a9ebcf71874a622abe2c8
-
SHA512
91da04f3ff9f893e1d4fe7f1475ab525d5b75bc021d3d6ce746b94988ae246a0970d6841be1b6fe8f7c4cd79bc6215d10547c4b02158630a2f8c6a1412a1a057
Behavioral task
behavioral1
Sample
SOA_JAN_MAY_20_doc.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SOA_JAN_MAY_20_doc.exe
Resource
win10v20201028
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pptoursperu.com - Port:
587 - Username:
[email protected] - Password:
mailppt2019-
Targets
-
-
Target
SOA_JAN_MAY_20_doc.exe
-
Size
500KB
-
MD5
2e1a3f171e9adfb0cbd28a59a72409e3
-
SHA1
5a2b23a48bc746f333663baffbe9b8e166a72008
-
SHA256
dccf76439fbd7e0afbaf8b56edda49b8a842c4b9447a9ebcf71874a622abe2c8
-
SHA512
91da04f3ff9f893e1d4fe7f1475ab525d5b75bc021d3d6ce746b94988ae246a0970d6841be1b6fe8f7c4cd79bc6215d10547c4b02158630a2f8c6a1412a1a057
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
AgentTesla Payload
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Suspicious use of SetThreadContext
-