General
-
Target
SecuriteInfo.com.BehavesLike.Win32.Generic.tz.259
-
Size
2.0MB
-
Sample
210126-fcawqwzkca
-
MD5
3c68883aec0f8998e92336eb1e4a5dfc
-
SHA1
55f2c9c5622104af60bbdfdb50614d3add1cf83d
-
SHA256
83ed44db03acc4abfb655a211c01e03c56bab2a016e603de64aeeb0bca8a77ca
-
SHA512
530e1c300677f8a8dade7dbc1b15abef0974a935255c5739f720f000c2b1931cf0f7eaf7837d4630a920d2e674023abc699f8ccf325c0de4e7ce1846bfe78806
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BehavesLike.Win32.Generic.tz.259.exe
Resource
win7v20201028
Malware Config
Extracted
Protocol: smtp- Host:
mail.owlpk.com - Port:
587 - Username:
accounts@owlpk.com - Password:
786owlacc?
Extracted
agenttesla
Protocol: smtp- Host:
mail.owlpk.com - Port:
587 - Username:
accounts@owlpk.com - Password:
786owlacc?
Targets
-
-
Target
SecuriteInfo.com.BehavesLike.Win32.Generic.tz.259
-
Size
2.0MB
-
MD5
3c68883aec0f8998e92336eb1e4a5dfc
-
SHA1
55f2c9c5622104af60bbdfdb50614d3add1cf83d
-
SHA256
83ed44db03acc4abfb655a211c01e03c56bab2a016e603de64aeeb0bca8a77ca
-
SHA512
530e1c300677f8a8dade7dbc1b15abef0974a935255c5739f720f000c2b1931cf0f7eaf7837d4630a920d2e674023abc699f8ccf325c0de4e7ce1846bfe78806
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Turns off Windows Defender SpyNet reporting
-
AgentTesla Payload
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-