General
-
Target
SWIFT MT760_PDF 18-10-21_PDF.exe
-
Size
438KB
-
Sample
211018-dt6z5sdad9
-
MD5
d48b9b70d7ab84df6a0126d852a69ef2
-
SHA1
87e1bc29d19cfc8b343f769a04c777ad844054fe
-
SHA256
304c9cfbe49035af82f072ce9bb95db5c95070b4368080113b2e4d4a21096e8f
-
SHA512
203c73e854679b8ea798cdb79d2fc954ac07f47d558b1ae7776c2c6e21f756ff295401d94936fbc1baec642ac2bcb50dd66c8e0de819c84674549015a836ca8f
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT MT760_PDF 18-10-21_PDF.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
SWIFT MT760_PDF 18-10-21_PDF.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.securido.my - Port:
587 - Username:
[email protected] - Password:
securido2411
Targets
-
-
Target
SWIFT MT760_PDF 18-10-21_PDF.exe
-
Size
438KB
-
MD5
d48b9b70d7ab84df6a0126d852a69ef2
-
SHA1
87e1bc29d19cfc8b343f769a04c777ad844054fe
-
SHA256
304c9cfbe49035af82f072ce9bb95db5c95070b4368080113b2e4d4a21096e8f
-
SHA512
203c73e854679b8ea798cdb79d2fc954ac07f47d558b1ae7776c2c6e21f756ff295401d94936fbc1baec642ac2bcb50dd66c8e0de819c84674549015a836ca8f
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-