General
-
Target
confirm below invoice.exe
-
Size
798KB
-
Sample
210417-5hv4adj3a2
-
MD5
622f89217d5c630c8493f356a3ed5e23
-
SHA1
c8275a16747ae7c550f1b14e71c91dc06eb1ceef
-
SHA256
f1be45f58c89c8b3b77fda6341568c4388d95ded7597304a04b98c57ddfc4a6c
-
SHA512
e0ecf783296afac12ce6ac7567721f5ae9542047f145fd4f40703840781cf34e5b19229f3df9ffc07981e4b085881ca4a41d3c7076abdc31180fdaf5588d335e
Static task
static1
Behavioral task
behavioral1
Sample
confirm below invoice.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
confirm below invoice.exe
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ckclegal.com - Port:
587 - Username:
[email protected] - Password:
S1_CJLP=XwM+
Targets
-
-
Target
confirm below invoice.exe
-
Size
798KB
-
MD5
622f89217d5c630c8493f356a3ed5e23
-
SHA1
c8275a16747ae7c550f1b14e71c91dc06eb1ceef
-
SHA256
f1be45f58c89c8b3b77fda6341568c4388d95ded7597304a04b98c57ddfc4a6c
-
SHA512
e0ecf783296afac12ce6ac7567721f5ae9542047f145fd4f40703840781cf34e5b19229f3df9ffc07981e4b085881ca4a41d3c7076abdc31180fdaf5588d335e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-