General
-
Target
0dfde6eb8081fd42bd8b6baaabf56f995872b6f2be0eba371817eb4754a00bca
-
Size
527KB
-
Sample
220520-2n3yasagck
-
MD5
2f37be581da46e3223cc276a582bb068
-
SHA1
0b81ee6db4edf4dfea7874d52b8707707fdd8ab5
-
SHA256
0dfde6eb8081fd42bd8b6baaabf56f995872b6f2be0eba371817eb4754a00bca
-
SHA512
3d35a77e4938eb0f11b0e13ea3d5d3f5ce480ff1c87907f83c79f535d7f354603129fcd41c3c29c2395cbda7befee7c14526192592b5a4682806308654a2d43f
Static task
static1
Behavioral task
behavioral1
Sample
Spare parts demand order.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Spare parts demand order.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.prcpl.com - Port:
587 - Username:
[email protected] - Password:
jyotika@2015
Targets
-
-
Target
Spare parts demand order.exe
-
Size
725KB
-
MD5
2fbc5c23cc080717a4bbce55ff6f3f26
-
SHA1
18c214848e1bdde00cb5233eae45f9ff9f469698
-
SHA256
76c6dd89d385638ed14036393f9e31c6a92417952f95655e66beacf003c88891
-
SHA512
de29b3d7fcb0a4d43d0c60723391d17ee68283f6f4137dd0d774d6855f3ea2fbcab70fb727630f93287f2e150d19a2d1a92e1f62469bd64cc72823df11e16951
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-