General
-
Target
647e4a06ecaf7d9f5f992c7e52bb985bdc0e2000c2ccbdda5bb68ca78ede2e12
-
Size
518KB
-
Sample
220520-2gcsjaaddm
-
MD5
e5859430e43ff8511f67620c401392bf
-
SHA1
ffe90a04a859ce2950e2a4c1c7afb371ec49ffeb
-
SHA256
647e4a06ecaf7d9f5f992c7e52bb985bdc0e2000c2ccbdda5bb68ca78ede2e12
-
SHA512
792980acbcfd7d2ccbda7fe3cfb5a2d69b458e11a701ddfbebf957c9d5e8f47f3e89df8baa72125fbf4a10832de066e52f9b67c28b5cd33d161f86e10bbc3ec5
Static task
static1
Behavioral task
behavioral1
Sample
LIST0117398902791PDF.7z.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
LIST0117398902791PDF.7z.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
chi-node26.websitehostserver.net - Port:
587 - Username:
[email protected] - Password:
@LENOVO,/+473
Extracted
Protocol: smtp- Host:
chi-node26.websitehostserver.net - Port:
587 - Username:
[email protected] - Password:
@LENOVO,/+473
Targets
-
-
Target
LIST0117398902791PDF.7z.exe
-
Size
551KB
-
MD5
68f96495af73a997500b00b2a88b599b
-
SHA1
e4f722b3d8046e6404f933354d689448d326fd45
-
SHA256
d4eec3387fde66fc5b45135db86b9fcdebcb75e199fe9be1a834d89cac6b9d13
-
SHA512
cde2179228efcaaba6af7c48377ee15b445c617502a107ef0cb9287297437bd074e2b77698a7e08a3c44364d179390c4daadbdf4de05aab61368f1ca23475038
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-