General
-
Target
HSBC Payment swift Copy emt 103.exe
-
Size
482KB
-
Sample
211018-yvzmnseef5
-
MD5
92d46dc497cc7f6fbb8e8dafeb5004c5
-
SHA1
f2fce89e6f5f7d997f190d8d4aafefcc8048fbea
-
SHA256
506909940f55e0c21e273759d8f7dcc1a3d76ea0374f212008ce871d706f1fe6
-
SHA512
795865abb4a3bdcdbb47ed754990b4de69b6ae3554cd769880b407eb5b844d74923bec0ab08026ea843b500a0d164c0346ec0ceef52a59042cb32542e2c378bb
Static task
static1
Behavioral task
behavioral1
Sample
HSBC Payment swift Copy emt 103.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
HSBC Payment swift Copy emt 103.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bulletproofprotections.com - Port:
587 - Username:
[email protected] - Password:
Everest10account
Targets
-
-
Target
HSBC Payment swift Copy emt 103.exe
-
Size
482KB
-
MD5
92d46dc497cc7f6fbb8e8dafeb5004c5
-
SHA1
f2fce89e6f5f7d997f190d8d4aafefcc8048fbea
-
SHA256
506909940f55e0c21e273759d8f7dcc1a3d76ea0374f212008ce871d706f1fe6
-
SHA512
795865abb4a3bdcdbb47ed754990b4de69b6ae3554cd769880b407eb5b844d74923bec0ab08026ea843b500a0d164c0346ec0ceef52a59042cb32542e2c378bb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-