General
-
Target
c4e94808f3ff6682b898624c4e7a077dd974d0c9c541e5f4808ef130eb602578
-
Size
371KB
-
Sample
220520-19ebdsehe8
-
MD5
b9c304f81accea0779413072ff186222
-
SHA1
cc8525ac924e94950c2524adbf7a8fc27d046c79
-
SHA256
c4e94808f3ff6682b898624c4e7a077dd974d0c9c541e5f4808ef130eb602578
-
SHA512
c0e03276381a6f14264c28709ee84b59e7c8c4021bad7ef559c19d43df24b21775c9cf4c75b9d9fb566dc04c0e8e6ce83ff9224d17d5b6755b8b404447e0af43
Static task
static1
Behavioral task
behavioral1
Sample
PO#908827 dated 9-7-2020 2019BT206-1+2020BT021+042.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PO#908827 dated 9-7-2020 2019BT206-1+2020BT021+042.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
gnaeask@2015
Extracted
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
gnaeask@2015
Targets
-
-
Target
PO#908827 dated 9-7-2020 2019BT206-1+2020BT021+042.exe
-
Size
586KB
-
MD5
771d6920c81e63c41104ceb4b31b3d95
-
SHA1
556f0940be0985b4f661d57fa894de06d945a53e
-
SHA256
2f749c6cbdf1d58629bc39b28bb2b1f74766bfb982cc31e3461d1c4bcbd32b01
-
SHA512
2ba7095fef121ed4d31e5bc5a171f09baa4b3c274e56428ec1b2c4e32ecc4a83315f13268f0e569d045a6c2fc189315b5897b2f703ecbb21ce8093dc0c5b1938
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-