General
-
Target
dcf30d6873c46c59ea16df5d1e0cab2f2d8fe00674254040fb2b18906fd3972c
-
Size
456KB
-
Sample
220520-3pg8nahcd5
-
MD5
f8119d0a1b987c75787a72ad142abc8a
-
SHA1
137612d1360dfaea9930d4d9589a45473305b30d
-
SHA256
dcf30d6873c46c59ea16df5d1e0cab2f2d8fe00674254040fb2b18906fd3972c
-
SHA512
5914b8c308f6cf181c0e9fe2a820f08276ee6b9bedcb25d1b83d47adfd376f6c3278913a569e99fde1fd2432e45bd420244a45c833a2fa0d26e46ef83e1053d8
Static task
static1
Behavioral task
behavioral1
Sample
REMITTANCE ADVICE IF0112000212823419.pdf..exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
REMITTANCE ADVICE IF0112000212823419.pdf..exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.stankovic.hr - Port:
587 - Username:
[email protected] - Password:
mp58zg
Targets
-
-
Target
REMITTANCE ADVICE IF0112000212823419.pdf..exe
-
Size
714KB
-
MD5
1a25e75693b99ad09e55aea29c6f2775
-
SHA1
127c636848aff40eb37c0bdb325ec7d1c4c3bfca
-
SHA256
c2bc9f2091a56e2d7045ddc273ba91462252f51baec6e6e62f6d0a08735564dd
-
SHA512
c3fa5315b9069ce059203273536d42e337504bba5b7c31570298356b32219e487b7ee99d43ad81dbae2bc1e9da06cf0f2c87fedeeb755a921056a5be65daabd2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-