General
-
Target
ITM inspection time change.exe
-
Size
573KB
-
Sample
210201-bx3vehzlwx
-
MD5
507b34df703d6b225425e3818bc5f1e0
-
SHA1
e82bc803194cc2fe5fa56193acdb6183eaecf7cd
-
SHA256
b0ae0cf3460d2a354e39765626ec1059dbcc3d7cb7764abdeaa0790c3e6f574c
-
SHA512
6abead02a54a22ee48676df616b1a06ed2efbdf452461f97a2f4cdfd83ae264deb8a91fa7de5766d3a698ce4c7395df1464b5699c587f2002ccc6af54c4feac4
Static task
static1
Behavioral task
behavioral1
Sample
ITM inspection time change.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
ITM inspection time change.exe
Resource
win10v20201028
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
PfV^BQW2
Targets
-
-
Target
ITM inspection time change.exe
-
Size
573KB
-
MD5
507b34df703d6b225425e3818bc5f1e0
-
SHA1
e82bc803194cc2fe5fa56193acdb6183eaecf7cd
-
SHA256
b0ae0cf3460d2a354e39765626ec1059dbcc3d7cb7764abdeaa0790c3e6f574c
-
SHA512
6abead02a54a22ee48676df616b1a06ed2efbdf452461f97a2f4cdfd83ae264deb8a91fa7de5766d3a698ce4c7395df1464b5699c587f2002ccc6af54c4feac4
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-