General
-
Target
f288c209_by_Libranalysis
-
Size
975KB
-
Sample
210507-k9mk377vhn
-
MD5
f288c209bc56720595434fb93389e447
-
SHA1
65295b9d14f69b5af473dcbfffeb0c63b45e3176
-
SHA256
c5027168d892a9fb3e917556dfed86361541ea200a27f52c225e96f841c28c02
-
SHA512
1b8f65bc9e6f97c83081b03f2ff1d0a2b7649da66bbe30b605196b70c08256c4e2993eb900cd2407c31a2ea4ad64c6426065938ba798691e2264766a0b2bacce
Static task
static1
Behavioral task
behavioral1
Sample
Samples_Order_Schedule#483948-2021_Vinhphu_General_Joint_STock.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Samples_Order_Schedule#483948-2021_Vinhphu_General_Joint_STock.exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
product catalog.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
product catalog.exe
Resource
win10v20210410
Malware Config
Extracted
nanocore
1.2.2.0
79.134.225.91:4488
098e4f4f-7679-4607-961c-79d0e06713b4
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-02-05T09:58:00.832696536Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4488
-
default_group
NEW
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
098e4f4f-7679-4607-961c-79d0e06713b4
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
79.134.225.91
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
agenttesla
Protocol: smtp- Host:
smtp.vivaldi.net - Port:
587 - Username:
pagosbogaitrans@vivaldi.net - Password:
Qwerty2020Hp##
Targets
-
-
Target
Samples_Order_Schedule#483948-2021_Vinhphu_General_Joint_STock.exe
-
Size
863KB
-
MD5
e5785f7aa83ec8da6f28b438f821e5f6
-
SHA1
50036f7888d32490c69259b1db30cff8f14d98c5
-
SHA256
4471de15ce9e9b3bee5bc77b26e67fe91b6be5e51d7ef8e174b30a6c3e32e43a
-
SHA512
a26d8c0ff570a573ae2478ce4230367d14bebe3af7c4bf3aa410415b5724f132bc9eb353c6e9b68d0f959f5daa6d9e74f0a3fb2bc8d2fe8b35fde62b223b0eed
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
product catalog.exe
-
Size
889KB
-
MD5
88bee4665c30b61ba3ce47a6f5f6235f
-
SHA1
dea1443a4f05d4d17b0b019f0093f1c602c4701e
-
SHA256
af48d211d5bd97dbf5142304c87250f50244cc4b6649af0cd5e7fcc2193d03ed
-
SHA512
a039afa9a6a11ecd4b571a05bb094721deed9d04870f7c99f0818fdbeecd5abb0f3c68c843471ce06dee1492e8bcb7ec22703ef44c4fdcc22823c80151bc49fd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-