General
-
Target
PAYMENT INSTRUCTIONS COPY.exe
-
Size
508KB
-
Sample
211021-q9x4dsadd8
-
MD5
0b5beef801a105065d60c914ddfe9d35
-
SHA1
65b5d01bd6a75c690ef1b3912dfd964e7d220474
-
SHA256
1496e0af114dcc7b8a582a6640cd662e03682597021c5443b713d238093e8097
-
SHA512
3f4b8718bddba82e2d2c0791d63980e54b348af1e0e7eedea1fde66308db093c24c56445586789b195ce2691152969403242b5b26badec300fa27c358d6c2a7e
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT INSTRUCTIONS COPY.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
PAYMENT INSTRUCTIONS COPY.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
sg2plcpnl0023.prod.sin2.secureserver.net - Port:
587 - Username:
nbsupports@seshsupports.com - Password:
User@40378
Targets
-
-
Target
PAYMENT INSTRUCTIONS COPY.exe
-
Size
508KB
-
MD5
0b5beef801a105065d60c914ddfe9d35
-
SHA1
65b5d01bd6a75c690ef1b3912dfd964e7d220474
-
SHA256
1496e0af114dcc7b8a582a6640cd662e03682597021c5443b713d238093e8097
-
SHA512
3f4b8718bddba82e2d2c0791d63980e54b348af1e0e7eedea1fde66308db093c24c56445586789b195ce2691152969403242b5b26badec300fa27c358d6c2a7e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-