General
-
Target
new order 001.pps
-
Size
113KB
-
Sample
210113-wn6exmdvlx
-
MD5
6201df5c78c9638cc753b9d23b61e500
-
SHA1
28ff4b387e9da8e2eaf2f3dccfd8b0728b90adc3
-
SHA256
fbd1eaa637bf9ec6e7a77759026fab8c924114a1fbb5345534152746b6928431
-
SHA512
a03251cbeda811fd9ce7bdeadca0a8504a0de4069b996e297c7b2066a130f90feeed76223b35e0a0b23ff39d6951fdaf8637d9ce86ed7341c2cc26fce5026f4d
Static task
static1
Behavioral task
behavioral1
Sample
new order 001.pps
Resource
win7v20201028
Behavioral task
behavioral2
Sample
new order 001.pps
Resource
win10v20201028
Malware Config
Extracted
agenttesla
http://103.133.105.179/28/inc/e7c6400cf93299.php
Targets
-
-
Target
new order 001.pps
-
Size
113KB
-
MD5
6201df5c78c9638cc753b9d23b61e500
-
SHA1
28ff4b387e9da8e2eaf2f3dccfd8b0728b90adc3
-
SHA256
fbd1eaa637bf9ec6e7a77759026fab8c924114a1fbb5345534152746b6928431
-
SHA512
a03251cbeda811fd9ce7bdeadca0a8504a0de4069b996e297c7b2066a130f90feeed76223b35e0a0b23ff39d6951fdaf8637d9ce86ed7341c2cc26fce5026f4d
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
AgentTesla Payload
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-