General
-
Target
13deb1f9e3779ecdc3025f0252e22176
-
Size
742KB
-
Sample
210915-hts6haaae5
-
MD5
13deb1f9e3779ecdc3025f0252e22176
-
SHA1
fd7d53357ad66545b97a9333ad48186fb8ab41c8
-
SHA256
7a9a395febca4d19f4aae40a2ea18dc819bf7475175cdc2b15e68cb2b5beaff8
-
SHA512
c08652216e3e7734caebe23c6835f000044df5616ce1abed2ac4b13ccf303c5626ae74e45e17b3c2537f7026e1702ebd8447b504acd97688d28809afb9be81db
Static task
static1
Behavioral task
behavioral1
Sample
13deb1f9e3779ecdc3025f0252e22176.exe
Resource
win7-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
e.werner@eccovacs-europe.com - Password:
alibaba.com
Targets
-
-
Target
13deb1f9e3779ecdc3025f0252e22176
-
Size
742KB
-
MD5
13deb1f9e3779ecdc3025f0252e22176
-
SHA1
fd7d53357ad66545b97a9333ad48186fb8ab41c8
-
SHA256
7a9a395febca4d19f4aae40a2ea18dc819bf7475175cdc2b15e68cb2b5beaff8
-
SHA512
c08652216e3e7734caebe23c6835f000044df5616ce1abed2ac4b13ccf303c5626ae74e45e17b3c2537f7026e1702ebd8447b504acd97688d28809afb9be81db
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Turns off Windows Defender SpyNet reporting
-
AgentTesla Payload
-
Looks for VirtualBox Guest Additions in registry
-
Nirsoft
-
Executes dropped EXE
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-