General
-
Target
d187c78ee3fb9751461fe0df53c768aeb8fc8b68e26e92ac04f7a40c1e21ac9c
-
Size
538KB
-
Sample
220520-3r4vfahdf4
-
MD5
754be1870b3b6e2ed599059465165b35
-
SHA1
3f2589d75416267b14121084aee21f9d59189c5d
-
SHA256
d187c78ee3fb9751461fe0df53c768aeb8fc8b68e26e92ac04f7a40c1e21ac9c
-
SHA512
939a6e3195a891e9d42f8f86ef6313552230d7249361851b3f9355fad3e3d1c348f25e4145a29f136090dfa94f9b757f7c312c88c22120b417137661c3a50991
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SWIFT.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.varda.com.tr - Port:
587 - Username:
[email protected] - Password:
varda9997929
Targets
-
-
Target
SWIFT.exe
-
Size
1.3MB
-
MD5
e07c6e6de63bdd8421c369c9a39037fb
-
SHA1
480ea048101330927ce18c105c70a0dc4505a7fb
-
SHA256
3638d193b36a335bb93dc5f978fb5dc35c23a73d0e6c62a4316181286dc3cb57
-
SHA512
e82fda2359558e731db3fe83c8e6b2ec51f197efda9f8bd393e2978f414091faea4af92393463e4dada4c5c8fba3e77dbe47599a3b56548870c642b86b98ba73
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-