General
-
Target
e8787202c9ad9e69c0b3deaedc51542ee7aa7b3c55f642786d542197c996c6af
-
Size
458KB
-
Sample
220520-16vtzaegb9
-
MD5
28a9640019bbcbaf1e62fa72cbf019bb
-
SHA1
c9b92e09653bcbf4ec1c2f6eb85fcf5c743e1ca6
-
SHA256
e8787202c9ad9e69c0b3deaedc51542ee7aa7b3c55f642786d542197c996c6af
-
SHA512
38417f971439b63f1d7b7b2796643ee3f05417816a1acfbbb3e6101b0b4161b461ae6ff7bf412c74eed66d19df8faa99eb745cc787cbf5c962453334701d4902
Static task
static1
Behavioral task
behavioral1
Sample
BANK DETAILS,. (2).exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
BANK DETAILS,. (2).exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.blc.com.np - Port:
587 - Username:
[email protected] - Password:
Bhuramal123
Targets
-
-
Target
BANK DETAILS,. (2).exe
-
Size
545KB
-
MD5
0812e6b42bce4af2abf9b12bbe8379a8
-
SHA1
3f83730f63a233a6b37528b0fe8326d5ece24586
-
SHA256
3333a191bc36b4a7a76e51c0b7b83c5d2b7d253f074789c2302ec598c30711b3
-
SHA512
be52d77585fc3cb261b3b28b215f26daac4d2b8b4fbb6561a8a48ec207130619605c176d6dec11827826160f9c47655d12521433da5a0856291168981b0739f3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-