General
-
Target
Payment Notification.exe
-
Size
584KB
-
Sample
220521-amfmtsddcn
-
MD5
fba1b53648fa9c81bdfc0a0e33f73762
-
SHA1
4e00a2faacd524fe1bf939c0394bbeb88b6dedd1
-
SHA256
d552bb57d82e8720a65191f098c93286a607b3bd336ef14c04090693b6dd9200
-
SHA512
2c9c0e94ff37d83342b0bbebe09c1bcc449fce42c28271ab88bbd51b892c459f012e579de8ba64b0eec0ede3a2a35fccaaa1dfc29fe72c525221c3effe180235
Static task
static1
Behavioral task
behavioral1
Sample
Payment Notification.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Payment Notification.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.powerfactorgh.com - Port:
587 - Username:
[email protected] - Password:
Powercares4u_# - Email To:
[email protected]
Targets
-
-
Target
Payment Notification.exe
-
Size
584KB
-
MD5
fba1b53648fa9c81bdfc0a0e33f73762
-
SHA1
4e00a2faacd524fe1bf939c0394bbeb88b6dedd1
-
SHA256
d552bb57d82e8720a65191f098c93286a607b3bd336ef14c04090693b6dd9200
-
SHA512
2c9c0e94ff37d83342b0bbebe09c1bcc449fce42c28271ab88bbd51b892c459f012e579de8ba64b0eec0ede3a2a35fccaaa1dfc29fe72c525221c3effe180235
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-