General
-
Target
643e04faf727ac5d82b999694d956ee3cba7f940db80e0a19741ded299333ebd
-
Size
473KB
-
Sample
220521-ap9cxsdedn
-
MD5
c695c0e45750316677f7ad0ad991315e
-
SHA1
d44fde3474f228ed37041a27dcc0390187613850
-
SHA256
643e04faf727ac5d82b999694d956ee3cba7f940db80e0a19741ded299333ebd
-
SHA512
d79f2a9aeef9be5ea496956caf244b49b94d363627eaa2052c9908793bc38b58cf1c5b56807f1b0fa4c90a60228a8455ed3f6b0b4f5a4be4f6482210d4d889bb
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SWIFT pdf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aquariuslogistics.com - Port:
587 - Username:
[email protected] - Password:
AQL@2019#$
Targets
-
-
Target
SWIFT pdf.exe
-
Size
733KB
-
MD5
7049a8a60d535e335ad3ba4f32ac5b14
-
SHA1
a41c7239026a2820c2e79fa2b3e9e29194517c17
-
SHA256
40a33fa7eeec1caf0ee27f87a4c3d8fd8f1475789191a1693329e2fa154b02a2
-
SHA512
9755c2f86e208fdf9a6440cd2d1ad8c41e84425d55894d85a03b867c4a7a4ee76f7dfeee08881a1c2ea57ac1f64d1561db268be13349524d63b9cf5a72d8aec0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-