General
-
Target
B6LNCKjOGt5EmFQ.exe
-
Size
1.8MB
-
Sample
210114-atxb2xmmnn
-
MD5
80d255a6a5ec339e15d6fec3c0fef666
-
SHA1
bca665ff5a6a7084df2d424c0ed7fff3e141acbc
-
SHA256
3e48d983e3315501931c646f896a8189637f5b9d21c453b051cd17f2584ee3c4
-
SHA512
1bf61d60fc6646ff63786da850b4118fb15dcc6f2c831a8a80d58225cf55bfef395d69473afeae9d05f97c3adcedd90100c4266bc1d537b7f6d7f933cb6291c4
Static task
static1
Behavioral task
behavioral1
Sample
B6LNCKjOGt5EmFQ.exe
Resource
win7v20201028
Malware Config
Extracted
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
sales01@seedwellresources.xyz - Password:
MARYolanmauluogwo@ever
Extracted
matiex
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
sales01@seedwellresources.xyz - Password:
MARYolanmauluogwo@ever
Extracted
agenttesla
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
sales01@seedwellresources.xyz - Password:
MARYolanmauluogwo@ever
Targets
-
-
Target
B6LNCKjOGt5EmFQ.exe
-
Size
1.8MB
-
MD5
80d255a6a5ec339e15d6fec3c0fef666
-
SHA1
bca665ff5a6a7084df2d424c0ed7fff3e141acbc
-
SHA256
3e48d983e3315501931c646f896a8189637f5b9d21c453b051cd17f2584ee3c4
-
SHA512
1bf61d60fc6646ff63786da850b4118fb15dcc6f2c831a8a80d58225cf55bfef395d69473afeae9d05f97c3adcedd90100c4266bc1d537b7f6d7f933cb6291c4
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Matiex Main Payload
-
AgentTesla Payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-