General
-
Target
Payment Advice.pdf..exe
-
Size
866KB
-
Sample
210416-z8dhwrlvsx
-
MD5
4a3d5a4a2dc407cebfc5931be709064d
-
SHA1
4af07e40fbf839e188206ecc31c8e21148abcd67
-
SHA256
165064cd4b06721491a3d57b5e111faddb9cf6ff0b448b4d5387bb1eb8bb62f2
-
SHA512
2748cd53a6d79c4ac7eff49cbf0e0f4a585a23bb5c4c55159cf22c9dc080117d9e38c88ca69644c32d062fa802c60a3eb9e109cbae06b869895dd1d6fbca26b2
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice.pdf..exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Payment Advice.pdf..exe
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.lallyautomobiles.net - Port:
587 - Username:
[email protected] - Password:
Welcome@2021
Targets
-
-
Target
Payment Advice.pdf..exe
-
Size
866KB
-
MD5
4a3d5a4a2dc407cebfc5931be709064d
-
SHA1
4af07e40fbf839e188206ecc31c8e21148abcd67
-
SHA256
165064cd4b06721491a3d57b5e111faddb9cf6ff0b448b4d5387bb1eb8bb62f2
-
SHA512
2748cd53a6d79c4ac7eff49cbf0e0f4a585a23bb5c4c55159cf22c9dc080117d9e38c88ca69644c32d062fa802c60a3eb9e109cbae06b869895dd1d6fbca26b2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-