General
-
Target
Bank Swift.PDF.bat
-
Size
387KB
-
Sample
211018-bpyf4adab5
-
MD5
b6e43086a81e8b9249921daaac3fe3d0
-
SHA1
98e5fa683de5275a953ab72518ec8e380affe461
-
SHA256
ddad215db0b750c91aabd1b8032e038c53b67ab103b9c3ee52a7e4038c21ec32
-
SHA512
1fc3dbbd78b9093abfd7457ab9959a21901a8c15e6abe6a658c7a5577f0d3acea7f5acbec53b679f56084aab65975cfb384ad60929b1ed09dcc9b9721690518b
Static task
static1
Behavioral task
behavioral1
Sample
Bank Swift.PDF.bat.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Bank Swift.PDF.bat.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dipiluminacion.com - Port:
587 - Username:
[email protected] - Password:
icui4cu2@@
Targets
-
-
Target
Bank Swift.PDF.bat
-
Size
387KB
-
MD5
b6e43086a81e8b9249921daaac3fe3d0
-
SHA1
98e5fa683de5275a953ab72518ec8e380affe461
-
SHA256
ddad215db0b750c91aabd1b8032e038c53b67ab103b9c3ee52a7e4038c21ec32
-
SHA512
1fc3dbbd78b9093abfd7457ab9959a21901a8c15e6abe6a658c7a5577f0d3acea7f5acbec53b679f56084aab65975cfb384ad60929b1ed09dcc9b9721690518b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-