General
-
Target
a4e779e38a8d0ce7f6ecfcedcba9ddd6353bb2f53bfddbc34af8b03b04576e6d
-
Size
611KB
-
Sample
220521-aaq8sscgcl
-
MD5
5ab841ac053ac7db78d9cadbc4911d3a
-
SHA1
b499bfe101e09722b347eb2ba5438f1c1afeff12
-
SHA256
a4e779e38a8d0ce7f6ecfcedcba9ddd6353bb2f53bfddbc34af8b03b04576e6d
-
SHA512
a696ede34e2e7eff05bb3c1570950afb1ec4c00e57bd784572b1d2393d2f3045fa6291be8022991fd4b06db28025fecf00cbd688aacf4fad79d53a1ecebd7dc0
Static task
static1
Behavioral task
behavioral1
Sample
prove of payment 7302020.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
prove of payment 7302020.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.bnb-spa.com - Port:
587 - Username:
[email protected] - Password:
tPo!47:glt$E
Targets
-
-
Target
prove of payment 7302020.exe
-
Size
781KB
-
MD5
334a4702c2d6602a307a9ab03dfd5c33
-
SHA1
4ae1b8a89738d374f6abfc35f4b733057f4fd989
-
SHA256
61f33b4982359531b0f61caee9e5d0abf02413224fa7895d32d4a79ce638c9ad
-
SHA512
4c54e384138d64f72059e47f40a0c6e7886f26bd37a9f9bba32416fc42e5f102d1405712268308718f8d466c0b7d3f500d0641ad88cd919653211dd4de7532bb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-