General
-
Target
9241fe2040eee8dff9ef581a3285d40fe7c7400b9a070bb44e1a7ee6862b9d60
-
Size
1.2MB
-
Sample
220520-2c6vtafbb7
-
MD5
c2a58baf9157b1af437b300da6a20d9c
-
SHA1
3849783cdf8be65081077199249e8642399ea2df
-
SHA256
9241fe2040eee8dff9ef581a3285d40fe7c7400b9a070bb44e1a7ee6862b9d60
-
SHA512
7888cd1d919b63b05947aee1b462640df6f040f9e8d77cc25ed4c09610c17d1225e4fe27df261e785df82901d8e2fc549d08c5f1ae56bfd1823cb3eeb6904db8
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT_FO.scr
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SWIFT_FO.scr
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.northwestpowdercoating.co.uk - Port:
587 - Username:
[email protected] - Password:
C^0z.^LxykTW
Extracted
Protocol: smtp- Host:
mail.northwestpowdercoating.co.uk - Port:
587 - Username:
[email protected] - Password:
C^0z.^LxykTW
Targets
-
-
Target
SWIFT_FO.SCR
-
Size
601KB
-
MD5
5dd379f19b72469c4fda16482127df43
-
SHA1
884e23a65b5237c4faac8917c12e74a23cd6ff3e
-
SHA256
e8a210e30024fc86199e27d632e3e5d0768fde8c82cf609f37b8c44158d69a98
-
SHA512
1cbc6b6b65132d95b50ca374cb0f0346a8e963206a42d0889f4c6e5cb3b77fa828c7801d9295f0f1597ec7427c5ec81fe12d10b3642f5185bf6aa64f5cc02d01
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-