General
-
Target
PAYMENT_COPY_ HSBC BANK_Pdf.exe
-
Size
38KB
-
Sample
211018-lkfetsecbk
-
MD5
98c0e8ae038031c7f5f210119c1b0b36
-
SHA1
e63bb6d9ebe904e805f93f86dba97f6eeb6a5cef
-
SHA256
f090ea218b1b9efedee6bae4665c1066649dc0fb94542467a56ae5a0a2c693e0
-
SHA512
951259982fec7ccb4bcdaf4993e85f89ac041f28bd1150616ae59e983b91b5565610d379016a920df7465c7721c41e509802b298eab61e1446b9d47fc84b8e3d
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT_COPY_ HSBC BANK_Pdf.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
PAYMENT_COPY_ HSBC BANK_Pdf.exe
Resource
win10-en-20210920
Malware Config
Extracted
limerat
3AtEv1cfnjjwnaXZKwxd8fV5xh2sx5qNob
-
aes_key
NYANCAT
-
antivm
true
-
c2_url
https://pastebin.com/raw/rmZm7wcd
-
delay
3
-
download_payload
false
-
install
true
-
install_name
575756.exe
-
main_folder
Temp
-
pin_spread
true
-
sub_folder
\windows\
-
usb_spread
true
Extracted
agenttesla
Protocol: smtp- Host:
mail.meyaargroup.com - Port:
587 - Username:
[email protected] - Password:
Meyaar@123$
Targets
-
-
Target
PAYMENT_COPY_ HSBC BANK_Pdf.exe
-
Size
38KB
-
MD5
98c0e8ae038031c7f5f210119c1b0b36
-
SHA1
e63bb6d9ebe904e805f93f86dba97f6eeb6a5cef
-
SHA256
f090ea218b1b9efedee6bae4665c1066649dc0fb94542467a56ae5a0a2c693e0
-
SHA512
951259982fec7ccb4bcdaf4993e85f89ac041f28bd1150616ae59e983b91b5565610d379016a920df7465c7721c41e509802b298eab61e1446b9d47fc84b8e3d
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-