General
-
Target
26c5098fbb4be4871383a901013288d16a6a2aad7d0952c28fd888e080aea394
-
Size
397KB
-
Sample
201109-qsg67swgwx
-
MD5
30d8b124d51fdb2e5eaeffa3f3866a8a
-
SHA1
e96071bf6f27a3ceab8faca62efeb22cea272ad6
-
SHA256
26c5098fbb4be4871383a901013288d16a6a2aad7d0952c28fd888e080aea394
-
SHA512
7aaf30ba99a40ac2f1df477798f5487fc2e7fd27cce7ed637cf83d16ce645a14e43f0218a70757e267de0c959fae8bbdd4b281bf70c988ba38c392a6ce6138b2
Static task
static1
Behavioral task
behavioral1
Sample
26c5098fbb4be4871383a901013288d16a6a2aad7d0952c28fd888e080aea394.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
26c5098fbb4be4871383a901013288d16a6a2aad7d0952c28fd888e080aea394.exe
Resource
win10v20201028
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rbt.co.th - Port:
587 - Username:
sale@rbt.co.th - Password:
EV8fUWLv
Targets
-
-
Target
26c5098fbb4be4871383a901013288d16a6a2aad7d0952c28fd888e080aea394
-
Size
397KB
-
MD5
30d8b124d51fdb2e5eaeffa3f3866a8a
-
SHA1
e96071bf6f27a3ceab8faca62efeb22cea272ad6
-
SHA256
26c5098fbb4be4871383a901013288d16a6a2aad7d0952c28fd888e080aea394
-
SHA512
7aaf30ba99a40ac2f1df477798f5487fc2e7fd27cce7ed637cf83d16ce645a14e43f0218a70757e267de0c959fae8bbdd4b281bf70c988ba38c392a6ce6138b2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
AgentTesla Payload
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-