General
-
Target
058a6edcb13766ae0387d7b3e270d54231553dceb2a55d3d16bb40ab5c39042c
-
Size
372KB
-
Sample
220520-2rsazaahdm
-
MD5
6141a2ec78a4c3aa0b68813cbee7524e
-
SHA1
86f1acb8bdb380d3ca62a07cf8270908ecc1704b
-
SHA256
058a6edcb13766ae0387d7b3e270d54231553dceb2a55d3d16bb40ab5c39042c
-
SHA512
53b1f96bcfadb6d20653641617c4e5da6d694592ef4b810d5502ecc6a9e8b51eaaf99dc3eed50622ccc2aae5966a114aea8cde6d4cbe7ed1564b1ef3e80b453d
Static task
static1
Behavioral task
behavioral1
Sample
doc07486620200116112353.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
doc07486620200116112353.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aquariuslogistics.com - Port:
587 - Username:
[email protected] - Password:
AQL@2019#$
Extracted
Protocol: smtp- Host:
mail.aquariuslogistics.com - Port:
587 - Username:
[email protected] - Password:
AQL@2019#$
Targets
-
-
Target
doc07486620200116112353.exe
-
Size
424KB
-
MD5
27046fd97f839d57e3c19f66bcbbb3af
-
SHA1
2773004ab886097ca44cca67b0a87f372f720f21
-
SHA256
70a7c18aa0fb1b6a542988faad566ef09a748042d6451bb7cd50871ff95e09ca
-
SHA512
09640209fceb6d80799b3c9a2054d27e02a6066ba03c66b0d4e52baafe2c12b5dc8d92bdd2a3451d9cf839e0c341379066d1e63124589f4f2cb9e7d3af5931cf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-