General
-
Target
SOA May.xlt
-
Size
708KB
-
Sample
210510-k6xvw7n5yx
-
MD5
eab9dd0c6c9970b12851dc56c8e77ebb
-
SHA1
0ce87f1116fe287bc9415a051af23c81d27449c1
-
SHA256
1c409fee36dda5337ef340dd480d92fbf68da68bee2a28f267def6bbb63755f6
-
SHA512
fc619429f3ff49df839345f754ada67b35960c015b0be84289ae9aad8174142f4b6bce067bcb7babefd6aac65399806c528417329eb3dc1c87f0073e08bdb4cb
Static task
static1
Behavioral task
behavioral1
Sample
SOA May.xlt
Resource
win7v20210408
Behavioral task
behavioral2
Sample
SOA May.xlt
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.tractorandinas.com/ - Port:
21 - Username:
[email protected] - Password:
~P*xO7vPBc-o
Targets
-
-
Target
SOA May.xlt
-
Size
708KB
-
MD5
eab9dd0c6c9970b12851dc56c8e77ebb
-
SHA1
0ce87f1116fe287bc9415a051af23c81d27449c1
-
SHA256
1c409fee36dda5337ef340dd480d92fbf68da68bee2a28f267def6bbb63755f6
-
SHA512
fc619429f3ff49df839345f754ada67b35960c015b0be84289ae9aad8174142f4b6bce067bcb7babefd6aac65399806c528417329eb3dc1c87f0073e08bdb4cb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
AgentTesla Payload
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-