General
-
Target
0d2f730e4b147a8413e4d9c85a4d73533b170c307797c08dacfa16504976be19
-
Size
595KB
-
Sample
220520-2n5f5aagcm
-
MD5
2b000c8b0fe26716d318806b04328657
-
SHA1
1af72746e0450bb8a658fafab4d47ccc9a954fe0
-
SHA256
0d2f730e4b147a8413e4d9c85a4d73533b170c307797c08dacfa16504976be19
-
SHA512
c5b20b8b2ff15ab58e478c6e2fa60d20200a5ff43e372a98fd6966c5b9b9376a3b8e51a9bea47a659a6905d04ff59132b24c37e330275e111f01ef191269cbc5
Static task
static1
Behavioral task
behavioral1
Sample
swift comfirmation.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
swift comfirmation.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.uwcelectric.com - Port:
587 - Username:
[email protected] - Password:
TYT#ikd1
Targets
-
-
Target
swift comfirmation.exe
-
Size
647KB
-
MD5
910bc85e248fa7e2794e3d2469d3b94d
-
SHA1
09e4a1102f7df7a21f22bfc02f9649918db1f60d
-
SHA256
205034fed0edd3c5d8069c63783b3cfdeba86816e6f1f5f6899add096d482bff
-
SHA512
45bec61009a8bb18b860ac3086e94c3794fe353c85180e38ccb86b81c9f05137afb9fad605ea4ecbf3f60b84f20e17d11cafb430a13cb4c4e34c648677924dac
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-