General
-
Target
payment_copy_banca_mediolanum.pdf.exe
-
Size
72KB
-
Sample
211201-k97d6sebh6
-
MD5
5ab0a977c3e88aff0244e376275f1487
-
SHA1
a11e8f73d2a01ad6ee8a8df6f400c2baa571ba33
-
SHA256
660618df19d3cb8275659686a82d840f748ac7d1f31c974af715cc77b8c737d7
-
SHA512
791c45a8c5a866e7ba7416bbbea60db172c1d75187c4252e2786035b8eca4442649f24846334824fe163e6e52e9c4393885be8b8a658dcbabcc1ddad5c1819fc
Static task
static1
Behavioral task
behavioral1
Sample
payment_copy_banca_mediolanum.pdf.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
payment_copy_banca_mediolanum.pdf.exe
Resource
win10-en-20211104
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.fullmachinespa.cl - Port:
587 - Username:
[email protected] - Password:
marcor2018
Targets
-
-
Target
payment_copy_banca_mediolanum.pdf.exe
-
Size
72KB
-
MD5
5ab0a977c3e88aff0244e376275f1487
-
SHA1
a11e8f73d2a01ad6ee8a8df6f400c2baa571ba33
-
SHA256
660618df19d3cb8275659686a82d840f748ac7d1f31c974af715cc77b8c737d7
-
SHA512
791c45a8c5a866e7ba7416bbbea60db172c1d75187c4252e2786035b8eca4442649f24846334824fe163e6e52e9c4393885be8b8a658dcbabcc1ddad5c1819fc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-