General
-
Target
fe07a568a1b28b5896f53ed9ef1be70fbda09f99f176c34e7e3f81e6ebfed81c
-
Size
404KB
-
Sample
220520-1496waefd2
-
MD5
3bda3401e6fc9807d239d8f346b1fe84
-
SHA1
73ff6462e077fde2699f41c1b46337cc2acbcaaa
-
SHA256
fe07a568a1b28b5896f53ed9ef1be70fbda09f99f176c34e7e3f81e6ebfed81c
-
SHA512
69aaa9ed4d00c2a184d8b2a240d287c6bbba0e81c47dee014d898880c5984312d97af08dc51c6f1426b693fb5d98e36d7271f55b7e3942ea36a389ecaffc13fd
Static task
static1
Behavioral task
behavioral1
Sample
Universal170920.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Universal170920.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.transfastc.com - Port:
587 - Username:
[email protected] - Password:
Godalone147
Targets
-
-
Target
Universal170920.exe
-
Size
492KB
-
MD5
1029af374ae0accd05afd9874ac61f3f
-
SHA1
3a37c6fe8e5120e828b6b21ccd8c440f332e86dc
-
SHA256
68624d31f561c1e2b735c18ecef36cc6c648803a19b34d1d75bf5815f3037675
-
SHA512
4b40af392516f84528fb7617f90457969889cfa2d9e2583b3e92ba9ea914e891fa2188bb1ec25ae70dc43eefe85020754ec4c6182de06209f1f9d11de159486b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-