General
-
Target
SOA.pdf'.rar
-
Size
437KB
-
Sample
210416-flt7gsqt7x
-
MD5
9b044351559ae6c19db1d285564ec31a
-
SHA1
f8c6bdfaa3f58e91de75c05c26eb95cabf9dc8e1
-
SHA256
521258037d1804b28809ffa5a8d0d5581e814deb5a1ba111b47ec84ca26b4e59
-
SHA512
ea845bcf6867514eaefcc9c6dfd1604874a0da94e93fb8dde16d2a394681df54e6e6c9f7211cf82c872a21faf89b395d1f1ab6c2cb0ac6b145c7527532566a22
Static task
static1
Behavioral task
behavioral1
Sample
SOA.pdf'.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
SOA.pdf'.exe
Resource
win10v20210408
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.lallyautomobiles.net - Port:
587 - Username:
[email protected] - Password:
Welcome@2021
Targets
-
-
Target
SOA.pdf'.exe
-
Size
771KB
-
MD5
603f42dcb85fbd19933316cf1b6bedd4
-
SHA1
33c38e2625cb5f44fcc1c44beec75db09718ce10
-
SHA256
276144fa4171733571ff6940ef10a3bb603028c99c51093d074f6cda0d65afda
-
SHA512
14fe5a280a055355e2a11eda7fd1e36392a50632bd4779e9651a7f161dd6f4f10c2f150b977ed80a6bd88c542df0aec5a8c57193e9d80459b961f6343c0274d6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-