General
-
Target
c47fa682104359755b8869fa308610acdccd3f58a4bdc237b2bf35d3b3dee464
-
Size
492KB
-
Sample
220520-19ft8aehe9
-
MD5
d688005f2ffe581b7e270f2a20f36cc4
-
SHA1
f15ca4b13b9a3c5c9351b1547603e9dd4f42fce3
-
SHA256
c47fa682104359755b8869fa308610acdccd3f58a4bdc237b2bf35d3b3dee464
-
SHA512
67d62e28e42c2be1d615a9ee17930e109a90f12a3dc969f6a0cc7fb215b6cf8927a309d627a7c291c776b3cc509b7745f01a62a5602760447beefd76aae076a4
Static task
static1
Behavioral task
behavioral1
Sample
Product List 002190.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Product List 002190.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.buiwei-wpc.com - Port:
587 - Username:
[email protected] - Password:
Nigeria111.?
Targets
-
-
Target
Product List 002190.exe
-
Size
580KB
-
MD5
fae687b07b9f66c1ef234997b1eddcf5
-
SHA1
fd118a14013ebcd32ddf0bd51dcee7ecbbd2e9a3
-
SHA256
7ed7208dfa92550e6dba4b98ced2dece328e230f4e57f4981031d172cc12690c
-
SHA512
505177b314cc653bf7109d0d71394dd442c10ea7fc806a9766c898219423371136a06401d1c00c26dd22fb9cabe6df847d3a37746d1e99fce92d288c701c8426
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-