General
-
Target
remitted payment.rar
-
Size
495KB
-
Sample
211201-pa62ksehe6
-
MD5
61eb0c46cdcb00d8ad754b7007b389f1
-
SHA1
f842a436d65dde30e5f3e64c9bfea9245e7648bd
-
SHA256
fd7f6b3cd2284c0319d470506fe31e728b71d29f48f895da285d037cd3a267b4
-
SHA512
e7199e8035b99d65c2ee8b96c9bdefe5488631ae65ee0f3e858328ee9b9b31fc2c50ebdfb84218caa5d93eaf8063ce838fd323ec7a488c27e2bbbf5a64cd645b
Static task
static1
Behavioral task
behavioral1
Sample
remitted payment.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
remitted payment.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.diva-italia.com - Port:
587 - Username:
[email protected] - Password:
rr.@%5LjgLz7
Targets
-
-
Target
remitted payment.exe
-
Size
568KB
-
MD5
4c26119e1dd83eed4bde02b5b39486ee
-
SHA1
674d02ae86c8754b3f416865b100f6bb966480fa
-
SHA256
31f4a07127c8422565a7c2e48f9b59356d56093de8e98c4bd0202c2b1e8f573c
-
SHA512
fa6ec50a992fc76a990f4fa3377bc1fe81bf27aff7fed217fa24e321e1a17e416bba0bea452c8aed74ead4faa436deeb7b0dc8e44cd9fca61b4dc90e32a8ffb7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-