General
-
Target
DUE INVOICES.exe
-
Size
958KB
-
Sample
210511-bewq7j1h16
-
MD5
c3dd015c631875adfecc6c229b474cf4
-
SHA1
26835d1df6761a455b6645fd27dba5dc7ed506b3
-
SHA256
7299f2323910def53bb344e98441a66dba82b84b0d8ec89dbddf0ee6a936280a
-
SHA512
dab1e8d81bcbf7a79aa454711a02c8f6cc39ce7aa07031a7891f57aba9f4bdb5a8d215436ff912a615954ace3d43a5d81e8fd01c08694585c4bbbf80967ecb4c
Static task
static1
Behavioral task
behavioral1
Sample
DUE INVOICES.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
DUE INVOICES.exe
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sat0rius.com - Port:
587 - Username:
sahar.fuchs@sat0rius.com - Password:
Almaseera_delta_0000
Targets
-
-
Target
DUE INVOICES.exe
-
Size
958KB
-
MD5
c3dd015c631875adfecc6c229b474cf4
-
SHA1
26835d1df6761a455b6645fd27dba5dc7ed506b3
-
SHA256
7299f2323910def53bb344e98441a66dba82b84b0d8ec89dbddf0ee6a936280a
-
SHA512
dab1e8d81bcbf7a79aa454711a02c8f6cc39ce7aa07031a7891f57aba9f4bdb5a8d215436ff912a615954ace3d43a5d81e8fd01c08694585c4bbbf80967ecb4c
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-