General
-
Target
PO #673975. PO #192075.exe
-
Size
1.8MB
-
Sample
210126-8ln68m9422
-
MD5
2872c85bb890812c9619fcc931ce05a2
-
SHA1
e96d950ac073aeee49b241eae694b76940e8cf95
-
SHA256
46096a5640a91cddbb2ea4d49d24f6df8e2d079f68a2559849ee9ff3a50281c3
-
SHA512
8346292a7cc7720a0472fc14c709703bd06e7ff2c523cc85dfa607f27e3f0b175a4f3ee030f7b1612a5188fb2912308d7690d2ed5e4108f8ab445c5695ab2558
Static task
static1
Behavioral task
behavioral1
Sample
PO #673975. PO #192075.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
PO #673975. PO #192075.exe
Resource
win10v20201028
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.newviking.com.my - Port:
587 - Username:
[email protected] - Password:
{&SgX:^(7m
Targets
-
-
Target
PO #673975. PO #192075.exe
-
Size
1.8MB
-
MD5
2872c85bb890812c9619fcc931ce05a2
-
SHA1
e96d950ac073aeee49b241eae694b76940e8cf95
-
SHA256
46096a5640a91cddbb2ea4d49d24f6df8e2d079f68a2559849ee9ff3a50281c3
-
SHA512
8346292a7cc7720a0472fc14c709703bd06e7ff2c523cc85dfa607f27e3f0b175a4f3ee030f7b1612a5188fb2912308d7690d2ed5e4108f8ab445c5695ab2558
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-