General
-
Target
PURCHASE ORDER #298767649DF.exe
-
Size
571KB
-
Sample
211202-h9jl1acfcm
-
MD5
38b5e64b40b7385e941853fafcca52ed
-
SHA1
3500d74b58a12151a541865eb72e54dc97553a8f
-
SHA256
0a15fc96322463009c95cafcf720acb2eb9dbee7baffbd1131532891db885a6e
-
SHA512
33b99a75e63d5d4497ef6a85e2a9f6cd3248a1110acec2864457b300194acdd582d9da6e932d9abca9265613495bbc753777066d4181462aef08862b89f96d6a
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER #298767649DF.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
PURCHASE ORDER #298767649DF.exe
Resource
win10-en-20211104
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dieseltronic.com.pe - Port:
587 - Username:
[email protected] - Password:
Asdiesel2019@?%%%,
Targets
-
-
Target
PURCHASE ORDER #298767649DF.exe
-
Size
571KB
-
MD5
38b5e64b40b7385e941853fafcca52ed
-
SHA1
3500d74b58a12151a541865eb72e54dc97553a8f
-
SHA256
0a15fc96322463009c95cafcf720acb2eb9dbee7baffbd1131532891db885a6e
-
SHA512
33b99a75e63d5d4497ef6a85e2a9f6cd3248a1110acec2864457b300194acdd582d9da6e932d9abca9265613495bbc753777066d4181462aef08862b89f96d6a
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-