General
-
Target
NEW INQUIRY ORDER.vbs
-
Size
701KB
-
Sample
211201-jkcb3aagck
-
MD5
03400b478590ab6c2f0d2d45de160ca7
-
SHA1
458fb15c509ba0bce9944ea27ad3b47fc4814f33
-
SHA256
0655fb82c82602fa8dd2329f60a8eb9bbe6b95384a49be2bc0992429c699d550
-
SHA512
a16c56be475a77ab474b9dc12fafb0947788c41e14181a59270b096a527d006737fec563e6f829398ffcf816b9fd981c8218c94598305e739a8ea60b4def0e6d
Static task
static1
Behavioral task
behavioral1
Sample
NEW INQUIRY ORDER.vbs
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
NEW INQUIRY ORDER.vbs
Resource
win10-en-20211104
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sataniindustries.com - Port:
587 - Username:
[email protected] - Password:
tanuj#sti963
Targets
-
-
Target
NEW INQUIRY ORDER.vbs
-
Size
701KB
-
MD5
03400b478590ab6c2f0d2d45de160ca7
-
SHA1
458fb15c509ba0bce9944ea27ad3b47fc4814f33
-
SHA256
0655fb82c82602fa8dd2329f60a8eb9bbe6b95384a49be2bc0992429c699d550
-
SHA512
a16c56be475a77ab474b9dc12fafb0947788c41e14181a59270b096a527d006737fec563e6f829398ffcf816b9fd981c8218c94598305e739a8ea60b4def0e6d
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-