General
-
Target
INVOICE.zip
-
Size
412KB
-
Sample
211201-jq1a3sdgg6
-
MD5
b87ceb8f2ef2d7dbb266b75f78e927c6
-
SHA1
4cf0048a145b8f88726c749dcd2dc231baeb697e
-
SHA256
401400d289a4793b90e2bbcb8e9b787f12f690f5405f6409b920a829135c3746
-
SHA512
bc6f0f884478f07a96cd034639927c4cfa47f6ad0d6e5c176389de402283762885556aed8abef1616bdfd107b1dd84bff2d7f377d96be284c735639d3ba2c3e2
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
INVOICE.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.focuzpartsmart.com - Port:
587 - Username:
[email protected] - Password:
Fpmabi@2016
Targets
-
-
Target
INVOICE.exe
-
Size
530KB
-
MD5
6426bbfce0fb5578344e80ea510bafb2
-
SHA1
6cd2481ce9fcfc58c6fc5405a437f7f639034085
-
SHA256
b72ebb6d27797219209ba8fdfbbe32447e34919e080af0a0fa31117921ad59b0
-
SHA512
c70f04f64310f6d5f112a2a36266b69a50918f09f8b33c900b512a7268196fa898c1c1da44b7786cc623c0a2673eff8d2699c9280d3cabf1aea9d27cf1536e06
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-