General
-
Target
bank TT slip.exe
-
Size
922KB
-
Sample
211021-q1p2esbcbn
-
MD5
f92972c4d6cb28b350e6fa0ce897ebf2
-
SHA1
edb8413f28ccda47f892f0ecdb85d80f5412cd93
-
SHA256
c3e1fb98c978c699c79b569c14c7bc41fce17a1846e9d66757ad579e3c97ceda
-
SHA512
0d761dac89dba988763cb86bf756f0ea17f3e2eee1badf545491bb8b56090a955e0b6b10c11835638256ac7cb69c73e2ca489db35480271bc7f3c90e4e5e4ccb
Static task
static1
Behavioral task
behavioral1
Sample
bank TT slip.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
bank TT slip.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.vibranthonda.co - Port:
587 - Username:
[email protected] - Password:
RADHE@123
Targets
-
-
Target
bank TT slip.exe
-
Size
922KB
-
MD5
f92972c4d6cb28b350e6fa0ce897ebf2
-
SHA1
edb8413f28ccda47f892f0ecdb85d80f5412cd93
-
SHA256
c3e1fb98c978c699c79b569c14c7bc41fce17a1846e9d66757ad579e3c97ceda
-
SHA512
0d761dac89dba988763cb86bf756f0ea17f3e2eee1badf545491bb8b56090a955e0b6b10c11835638256ac7cb69c73e2ca489db35480271bc7f3c90e4e5e4ccb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-