General
-
Target
229f478aaa51fd7d2bd00cfa60a1f370229b324ea71415bf174963070cef0440
-
Size
456KB
-
Sample
220520-2mb37afeh6
-
MD5
0cecb25909a56d653dd1f73900f12d52
-
SHA1
e4acff589a20519f96954653690d4898a4bca4b4
-
SHA256
229f478aaa51fd7d2bd00cfa60a1f370229b324ea71415bf174963070cef0440
-
SHA512
e008df2a5448d95adf6d30a02c711ae7d196a54ac995ad0a42a4e5a4de5d753dbb0e210b581fc8f507f6abbcbf9d597b50bb2a6839df916e72559add71919598
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
invoice.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.tiig-eg.com - Port:
587 - Username:
[email protected] - Password:
servicelorch
Targets
-
-
Target
invoice.exe
-
Size
541KB
-
MD5
7c2ab8164ec60eeea9ab0169ec7a475d
-
SHA1
cb750e8c591d9e0776552b32d50156929b3eae60
-
SHA256
66332e53989ee89d3c963cecd82424b45e332cadb2d9e13ba13f9f49d22b25ee
-
SHA512
15b844d0cfd0f6d6013b95f66abf07d88d805344eb8590c38e129b192b973026d5862299758dede7ac08ba731ff6f3455fb17b38ac84ecfa8f9a04c2f38959b9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-