General
-
Target
9d1f3215522d0b8aca1a5e14f236edc5d984b09f189da5d40ae2de9f1e83c9e1
-
Size
463KB
-
Sample
220520-2cf96aabhr
-
MD5
29fe0eada960857e627a088f882389ac
-
SHA1
25e177259852c2734a187f7a8090365c9f5fb897
-
SHA256
9d1f3215522d0b8aca1a5e14f236edc5d984b09f189da5d40ae2de9f1e83c9e1
-
SHA512
21962bc618b13f2b39adbfdb25c84af3d819356a1f57bcf2f509bc73a01f8bd2cb4c3fcbb423887a1317009975cac1f0b91ec260d8c53fa0db2a1bf5a5268049
Static task
static1
Behavioral task
behavioral1
Sample
MEDIFORM SA COMPANY PROFILE.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
MEDIFORM SA COMPANY PROFILE.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
@%*^)r#XFB738T!
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
@%*^)r#XFB738T!
Targets
-
-
Target
MEDIFORM SA COMPANY PROFILE.exe
-
Size
577KB
-
MD5
11c9bd39cd6d4ef66018de760b7b507f
-
SHA1
d2cfe2987e579f6df3df70a704af63c727691c4e
-
SHA256
1adb1e77313a4404c1133c255cece52584f329eeb223d6567beb97d9754125ce
-
SHA512
23cb64600ffbd7132360e3a263162eadcf6643e6a97e8b090e3009b733eb64e36093bc48320ee1f7ca399a572fc08c6093fa32a00b263296f15393467e43623f
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-