General
-
Target
Swift USD PDF.exe
-
Size
481KB
-
Sample
211021-gkrewahha3
-
MD5
f555598e6d0fb4e9c913b75080db2227
-
SHA1
7de938e7c00fe91c58519495615642dbd081fd94
-
SHA256
02e1afef37de9e6f85db592f56f13691548c8f796127e0d2c227c4f65b0033fc
-
SHA512
0c41f745e9791abde693d447776747ff13f9e0640328813a9e1bda913428923ea8333868e8a39fa3322ea9d0adbb1d4e400c06e6e224e4de25c0492acbbdc244
Static task
static1
Behavioral task
behavioral1
Sample
Swift USD PDF.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Swift USD PDF.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
charlyparkerparker@yandex.ru - Password:
Ablegod123456
Targets
-
-
Target
Swift USD PDF.exe
-
Size
481KB
-
MD5
f555598e6d0fb4e9c913b75080db2227
-
SHA1
7de938e7c00fe91c58519495615642dbd081fd94
-
SHA256
02e1afef37de9e6f85db592f56f13691548c8f796127e0d2c227c4f65b0033fc
-
SHA512
0c41f745e9791abde693d447776747ff13f9e0640328813a9e1bda913428923ea8333868e8a39fa3322ea9d0adbb1d4e400c06e6e224e4de25c0492acbbdc244
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-