General
-
Target
SOA COPY.exe
-
Size
611KB
-
Sample
210420-rrvddme1qn
-
MD5
5b06b2e2ac7a46b0a010e22b8b757842
-
SHA1
32ca16c02b65b3c926afdda78cb01f760f07cb88
-
SHA256
e8834d8376e9d83c926bd5ccbaf4af8bf76ad6d49fb4245a69253e5052293e07
-
SHA512
50ba996ab550bf3697d3bb942097fff13f46a2e218758231b918181114df0fb99e938a62ea07cb2a0a0d4a733bd0a8e18122182afb7cc8026809043a57cfd495
Static task
static1
Behavioral task
behavioral1
Sample
SOA COPY.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
SOA COPY.exe
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
a2plcpnl0347.prod.iad2.secureserver.net - Port:
587 - Username:
[email protected] - Password:
Admin_123
Targets
-
-
Target
SOA COPY.exe
-
Size
611KB
-
MD5
5b06b2e2ac7a46b0a010e22b8b757842
-
SHA1
32ca16c02b65b3c926afdda78cb01f760f07cb88
-
SHA256
e8834d8376e9d83c926bd5ccbaf4af8bf76ad6d49fb4245a69253e5052293e07
-
SHA512
50ba996ab550bf3697d3bb942097fff13f46a2e218758231b918181114df0fb99e938a62ea07cb2a0a0d4a733bd0a8e18122182afb7cc8026809043a57cfd495
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-