General
-
Target
9b3d2ad575d96c614206cb7524e0ed5be6974ec95341b780799f10b6eb2424b9
-
Size
564KB
-
Sample
220521-acj79saac6
-
MD5
cde58f8beeff92e7285673924485f91a
-
SHA1
ade1396bb8aa4804d984a36f576fcd5c523b55eb
-
SHA256
9b3d2ad575d96c614206cb7524e0ed5be6974ec95341b780799f10b6eb2424b9
-
SHA512
260e9ee5a73228d8b8b721566528ee89b2f67687209203917522e0a3529f1331deb69f0fb072d722fb427dd36cfe2c0ab6dc68a8018aa22d69a72e5d61eb8f83
Static task
static1
Behavioral task
behavioral1
Sample
FIRST PURCHASE ORDER pdf..exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
FIRST PURCHASE ORDER pdf..exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.daafco.com - Port:
587 - Username:
[email protected] - Password:
Rawan!@#
Targets
-
-
Target
FIRST PURCHASE ORDER pdf..exe
-
Size
827KB
-
MD5
9816d40b30b9873d12e4d5c9895cd4cc
-
SHA1
f0504c605d3f34de69fce002861895e740748e3a
-
SHA256
887b8c631973cc6f3007d8ac0e45d1a198999d131877dfcf2736fde9c2499401
-
SHA512
85c4961e8f148a6d871e5d5ae198ab0b0d1a0e50afb4ccd532fd585953dbd93bfdb6e00c9d29f84f634161f45bd7050095281387aefa15de5c86d080d6ad145a
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-