General
-
Target
Purchase Order ABIsrl.exe
-
Size
1.4MB
-
Sample
210201-4kyjk5n4wn
-
MD5
fba7ce54acf20b2b8ed6e3382f74a556
-
SHA1
c647d37aaf7036e6e3a72509104503e16bc48f67
-
SHA256
4a979bd7e0e8c280896dff251ded9179878a749a5512a30cfd0d7645c83b2afc
-
SHA512
dd06a23b31b39ce75ec8ac8b7cfbaf2925fab2e64f3955aa58775b871c9956a44ea1f7415d7e42c4c83fef38a7008072031ac34d1274ac8415e121b31de391b8
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order ABIsrl.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Purchase Order ABIsrl.exe
Resource
win10v20201028
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.d-techalgarie.com - Port:
587 - Username:
[email protected] - Password:
jOhKmtP8
Targets
-
-
Target
Purchase Order ABIsrl.exe
-
Size
1.4MB
-
MD5
fba7ce54acf20b2b8ed6e3382f74a556
-
SHA1
c647d37aaf7036e6e3a72509104503e16bc48f67
-
SHA256
4a979bd7e0e8c280896dff251ded9179878a749a5512a30cfd0d7645c83b2afc
-
SHA512
dd06a23b31b39ce75ec8ac8b7cfbaf2925fab2e64f3955aa58775b871c9956a44ea1f7415d7e42c4c83fef38a7008072031ac34d1274ac8415e121b31de391b8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-