General
-
Target
b89028ec83ec1b5d9a109231898fabc105b479d77ee7f4445fd7c93948b455dc
-
Size
1.2MB
-
Sample
220520-2ab8esfaa3
-
MD5
45e49174f851a964021c1ca578051dc7
-
SHA1
462a9231bc70e8a6419406f180cc39b41d67ab0a
-
SHA256
b89028ec83ec1b5d9a109231898fabc105b479d77ee7f4445fd7c93948b455dc
-
SHA512
2b4891ec3edae7aad7bbb6c467252b4d650319da271a328866c2252a9d5797b988f098e545de475a242885477c8d34c68f5c4c8eaa4379dc6b634254acc23711
Static task
static1
Behavioral task
behavioral1
Sample
DOCX_NEW.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
DOCX_NEW.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.orientalkuwait.com - Port:
587 - Username:
[email protected] - Password:
Operatingmanager1&
Targets
-
-
Target
DOCX_NEW.EXE
-
Size
346KB
-
MD5
d19bb675f1556e2617e336c79369d991
-
SHA1
87384fd048f16cc766e1a8944cfaaf37883f4989
-
SHA256
d68fd5dc4b913479f183b0577cb42d4e9c7a38458d5301336e3a0ac4639ea29e
-
SHA512
ff9091488693a8925df96cfa4049e269f69443e4214520faf1da6f00deecf25771b12547626abb94d678322db6a4ab9a702e8b267d5c0277354952649cb356e4
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-