General
-
Target
confirm below invoice.rar
-
Size
520KB
-
Sample
210417-ba4em5frhs
-
MD5
39325dc80666e2dc1124846ee05d4538
-
SHA1
f9f4436183214043e75e39e86d2e8793f4459f6d
-
SHA256
5710878413615a629139b9d577c3fe4a603038a1cc5ac73a9f98b1b5d6e88854
-
SHA512
f2a750304c00504567f542c41412404d1ad7bb8e1d6f2b4b5f308a65a407fcf7ecb3ce1337f93a063d3354fd228ed2e95bc9a4a8eac7f2b3f0536910bf764df9
Static task
static1
Behavioral task
behavioral1
Sample
confirm below invoice.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
confirm below invoice.exe
Resource
win10v20210408
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ckclegal.com - Port:
587 - Username:
[email protected] - Password:
S1_CJLP=XwM+
Targets
-
-
Target
confirm below invoice.exe
-
Size
798KB
-
MD5
622f89217d5c630c8493f356a3ed5e23
-
SHA1
c8275a16747ae7c550f1b14e71c91dc06eb1ceef
-
SHA256
f1be45f58c89c8b3b77fda6341568c4388d95ded7597304a04b98c57ddfc4a6c
-
SHA512
e0ecf783296afac12ce6ac7567721f5ae9542047f145fd4f40703840781cf34e5b19229f3df9ffc07981e4b085881ca4a41d3c7076abdc31180fdaf5588d335e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-