General
-
Target
SHIPPING DOCUMENT & PL.exe
-
Size
476KB
-
Sample
211018-xwg9caech3
-
MD5
b4bf9d3bda738a3d6794dfb47a85f011
-
SHA1
b81cfd36eed1b54cc8dd3001f1c3f6e007b3748b
-
SHA256
695d9cd287ce5ee85681b570ee37daa421550dc4b25101240bba64245a729bd9
-
SHA512
76259472997a20a2641acd4f797e25abbae63c989a45df7489f643175e6fc9187f616b2044dc0f49ea47904109e16fa7bf826658bd1f48acb6fd6f90d42b90a2
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING DOCUMENT & PL.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
SHIPPING DOCUMENT & PL.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.davaobay.com.ph - Port:
587 - Username:
[email protected] - Password:
p@ssw0rd
Targets
-
-
Target
SHIPPING DOCUMENT & PL.exe
-
Size
476KB
-
MD5
b4bf9d3bda738a3d6794dfb47a85f011
-
SHA1
b81cfd36eed1b54cc8dd3001f1c3f6e007b3748b
-
SHA256
695d9cd287ce5ee85681b570ee37daa421550dc4b25101240bba64245a729bd9
-
SHA512
76259472997a20a2641acd4f797e25abbae63c989a45df7489f643175e6fc9187f616b2044dc0f49ea47904109e16fa7bf826658bd1f48acb6fd6f90d42b90a2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-