General
-
Target
PAYMENT INSTRUCTIONS COPY.r15
-
Size
432KB
-
Sample
211021-q6dwcaadd2
-
MD5
b1c544371ee903516c8166c0afa0fd8b
-
SHA1
4d4ee33013bc983f4d8dc8cb5239f2e94fc49478
-
SHA256
6e7a10a1e3d148c3c27a669706d282d6a23f45399b87ef77c2f7737dc6d13dc1
-
SHA512
5268e1eeef8de43b8fb61ed8e0d0faf707b6c15fc56aac4092bc9fd22c15a7d3f96d8ad2efcce558230147397f3eb5ebe90d5cd78d7cb65e4e93d1440fc77eb2
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT INSTRUCTIONS COPY.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
PAYMENT INSTRUCTIONS COPY.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
sg2plcpnl0023.prod.sin2.secureserver.net - Port:
587 - Username:
[email protected] - Password:
User@40378
Targets
-
-
Target
PAYMENT INSTRUCTIONS COPY.exe
-
Size
508KB
-
MD5
0b5beef801a105065d60c914ddfe9d35
-
SHA1
65b5d01bd6a75c690ef1b3912dfd964e7d220474
-
SHA256
1496e0af114dcc7b8a582a6640cd662e03682597021c5443b713d238093e8097
-
SHA512
3f4b8718bddba82e2d2c0791d63980e54b348af1e0e7eedea1fde66308db093c24c56445586789b195ce2691152969403242b5b26badec300fa27c358d6c2a7e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-