General
-
Target
12a9296bbae006899ed14d94a52cdd92853798ae302b83ba57375642e53f2929
-
Size
654KB
-
Sample
220520-2njvesagak
-
MD5
abb5e57d3065709c03973c9f31441a0a
-
SHA1
9f27b017b8bdbb72a168fccc2d3b56d79998fce4
-
SHA256
12a9296bbae006899ed14d94a52cdd92853798ae302b83ba57375642e53f2929
-
SHA512
288839a6e1129deba28800b6a42a700b5f5f3401d1353854100eed250e10c7587c84df83dbef15d093bc2a45e1ad97c3718a4b2f40eeb9b075a9a0e8e8c8d566
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
INVOICE.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.grandtours.gr - Port:
587 - Username:
[email protected] - Password:
!Bitter-bullet-chuck-major!
Targets
-
-
Target
INVOICE.exe
-
Size
594KB
-
MD5
cdf5b175db3a7b60a0734daf15364717
-
SHA1
c56332d8c17c6aa873dbf177c44472409628ae05
-
SHA256
1df1597314ab01b00a84f5a025cb5112828d20fbc59dd3098fcb45fb88534661
-
SHA512
0df64f13bf872ffcf5693076c05301fb8786b3c100232f76284594c8990556c189f864212a13075094216acdf6b6352c345d2495953a5fa528d151111a1edb01
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-