General
-
Target
f2551af7103589ef0c6302fba59c0c3c1e1c0c500a343aa4932aca59ccc37efb
-
Size
1.2MB
-
Sample
220520-2t7hnsbadj
-
MD5
240a10c205c9fd62d58405518f3c7b18
-
SHA1
337557535a0940c404f7a72a62d096a9ddde6ef6
-
SHA256
f2551af7103589ef0c6302fba59c0c3c1e1c0c500a343aa4932aca59ccc37efb
-
SHA512
e8e0a982c8aff9254fc4fd96dcdc19268ab2b4814a76213041c33985daf28d03268b4941a5de6e42efb3f08e36d191697930311d2e2fe69d82ed0aa4f3c63d6b
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT__C.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SWIFT__C.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
chika12345@
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
chika12345@
Targets
-
-
Target
SWIFT__C.EXE
-
Size
405KB
-
MD5
76e2b77b8945a9d50034405c520fad02
-
SHA1
6645d985c7a50f7bf5bb1c49716e18f6af7de6ca
-
SHA256
516b18a120eb6f6380a7df0ff52def508e3da5e79b12a60647cc438e478e3363
-
SHA512
946aa476a2905bff089bb5fc6ade46f0d4b3202bfc34ca876be40dfd42729cda4556b6960225bef41c126fa206271c970e6d2e8bd7f641307e699169349820ad
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-