General
-
Target
Ningbo_Outstanding_Payments.exe
-
Size
1.2MB
-
Sample
210416-q3yqcdyzfs
-
MD5
fa7f7b4b92e71a14bd56f292ab142c89
-
SHA1
9804cd46c5bd25e805865f83006bb42c01c6fd2f
-
SHA256
0e8f5b7bb9a8fb551c67b15bd74cf530324e939b8acd491fac54a7a64a51b568
-
SHA512
d0bafb20dad0376cb5f417d6ac8e56bf613b3084f4b216b4e10b87cbecd40f06eddd665a9abbb2736085f316906ba73b0591a268aafd4dd62645ec3b943b1511
Static task
static1
Behavioral task
behavioral1
Sample
Ningbo_Outstanding_Payments.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Ningbo_Outstanding_Payments.exe
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.mdist.us - Port:
587 - Username:
[email protected] - Password:
pos#4321
Targets
-
-
Target
Ningbo_Outstanding_Payments.exe
-
Size
1.2MB
-
MD5
fa7f7b4b92e71a14bd56f292ab142c89
-
SHA1
9804cd46c5bd25e805865f83006bb42c01c6fd2f
-
SHA256
0e8f5b7bb9a8fb551c67b15bd74cf530324e939b8acd491fac54a7a64a51b568
-
SHA512
d0bafb20dad0376cb5f417d6ac8e56bf613b3084f4b216b4e10b87cbecd40f06eddd665a9abbb2736085f316906ba73b0591a268aafd4dd62645ec3b943b1511
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-