General
-
Target
Lebanon Khayat Trading Company.exe
-
Size
350KB
-
Sample
211026-p9cxsahea8
-
MD5
24e677dbfb1bb82a006bbdf04c499d8f
-
SHA1
09a1ae987b86916026ed6e1e0e596a096910a1ae
-
SHA256
9f5267ca82e582370eca876960153a242346739c61f7042438e8a4213d1e0666
-
SHA512
4f62dc3b59b452ef9d2025f0accc4dd27185b706da73c576f67f40b9e8329f5e610d56236455967103c11157155db5591723976692da351ab5bcbd4e5bec1617
Static task
static1
Behavioral task
behavioral1
Sample
Lebanon Khayat Trading Company.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Lebanon Khayat Trading Company.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
sg2plcpnl0023.prod.sin2.secureserver.net - Port:
587 - Username:
[email protected] - Password:
User@40378
Targets
-
-
Target
Lebanon Khayat Trading Company.exe
-
Size
350KB
-
MD5
24e677dbfb1bb82a006bbdf04c499d8f
-
SHA1
09a1ae987b86916026ed6e1e0e596a096910a1ae
-
SHA256
9f5267ca82e582370eca876960153a242346739c61f7042438e8a4213d1e0666
-
SHA512
4f62dc3b59b452ef9d2025f0accc4dd27185b706da73c576f67f40b9e8329f5e610d56236455967103c11157155db5591723976692da351ab5bcbd4e5bec1617
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-