General
-
Target
TT swify Order.zip
-
Size
461KB
-
Sample
211017-nevnnsdddn
-
MD5
4ea70ffb53c032f8320eae5ef5116855
-
SHA1
1add82f34e7bde3480028d4d1a0e8066e8f6dd23
-
SHA256
37689ef3bb00444ecd46b782cb4d22e851ba4954684ee483033e38e8e4cf2931
-
SHA512
65c5dc8e254b2508d138d7013ac35bbf95c3b39c24f07924c56d5100dc0f035e3e59e9b36a48906aa8eb16be798099b26322c0c4b16603908e2857b7eb2c9ad9
Static task
static1
Behavioral task
behavioral1
Sample
TT swify Order.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
TT swify Order.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ananthasuites.com - Port:
587 - Username:
[email protected] - Password:
Anantha225@#
Targets
-
-
Target
TT swify Order.exe
-
Size
735KB
-
MD5
f8c04a79425fbd0bde8ee6dd132d655b
-
SHA1
b10826eb64f5d2469df8f776df34405cee0d1d05
-
SHA256
6459b80dbdfbf19a21456659f618c0e22693b4d2389e5cfbba864e5d2b85eb1a
-
SHA512
3e02e41db2e64c12360972886ed83838c45d702f68d1bc07a47e613d1c8392d13ba393eb6cecbe18a7d4991229b7f6e89525d61bdb0dd77815422956b4c3d92d
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-