General
-
Target
94e40e838fec7771d393daacf71cc69b9a09b0291069cc40e8d28df8f6c9edab
-
Size
409KB
-
Sample
220520-2cx8nsfba8
-
MD5
54b3fc90f82fbbcefcf528e9a8c4c660
-
SHA1
f774945df2c0380432d6f379394abfbb3ede49c9
-
SHA256
94e40e838fec7771d393daacf71cc69b9a09b0291069cc40e8d28df8f6c9edab
-
SHA512
32c1d42e647c9d2b0b1fb0ce0441d4fef39029a328bccbfe3b0c73e95603c8b487eb4e0944e7739cb0ef0285e7d980cbfa818f8f14eeafd8a0158de92ab1bc56
Static task
static1
Behavioral task
behavioral1
Sample
Statement July 2020.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Statement July 2020.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.leffamatrizes.com.br - Port:
587 - Username:
[email protected] - Password:
amx1020
Targets
-
-
Target
Statement July 2020.exe
-
Size
476KB
-
MD5
e309883e50a4d2bb148238efa4cb455b
-
SHA1
f30d7904f67d3483368506ae05fe91d215c6af06
-
SHA256
c5df3c7e944f4f367f05546bcf2a661db13dae555a585f16b7599d35cb12213e
-
SHA512
b26ece277c15a3a9874fd34a95276e370604d4f3083646418dcd6aaedd51570e2051fd16c568b7c59ac3e617fb096c67fb423c66d14d27f0fc9035dffd06c728
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-