General
-
Target
NEW order.rar
-
Size
520KB
-
Sample
210416-2jp77n3jjj
-
MD5
2cf38e082424bdde914e6c306e966cb8
-
SHA1
45f8f8ba298b218ca3d189d2f368cbc162d44bfa
-
SHA256
70ddb3ba767338a506e8753c7a1f51ad0bb9b452a2e62b434154cb9540d70dec
-
SHA512
f0cb88d4ff284434158c86f8eaf522713fcf719075c9a1c63dc59e3277ebf2aad173f98084b5edc3691e3f56d9ce4b41b58a832bbfb41b10d60f9d13088a1605
Static task
static1
Behavioral task
behavioral1
Sample
NEW order.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
NEW order.exe
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ckclegal.com - Port:
587 - Username:
[email protected] - Password:
S1_CJLP=XwM+
Targets
-
-
Target
NEW order.exe
-
Size
798KB
-
MD5
622f89217d5c630c8493f356a3ed5e23
-
SHA1
c8275a16747ae7c550f1b14e71c91dc06eb1ceef
-
SHA256
f1be45f58c89c8b3b77fda6341568c4388d95ded7597304a04b98c57ddfc4a6c
-
SHA512
e0ecf783296afac12ce6ac7567721f5ae9542047f145fd4f40703840781cf34e5b19229f3df9ffc07981e4b085881ca4a41d3c7076abdc31180fdaf5588d335e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-