General
-
Target
4dd809ef7b62945f513de235fef1665fad3cfd0b4efb56c170c03502bde36280
-
Size
486KB
-
Sample
220521-bbdvjabfc5
-
MD5
873b2359aa7f239f9815166c5c33019f
-
SHA1
982f3043ee24b71b54eda54509adc60a501a24e5
-
SHA256
4dd809ef7b62945f513de235fef1665fad3cfd0b4efb56c170c03502bde36280
-
SHA512
14b472f93924dce7774126d76005f284bce21dc87d14d02d2dd981d570feb2773b56839eccec6c9910b236150134646402e1c1b208477ebd0d58b385e4f2503e
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE_2203320045_xlxs.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
INVOICE_2203320045_xlxs.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
blessing2020
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
blessing2020
Targets
-
-
Target
INVOICE_2203320045_xlxs.exe
-
Size
526KB
-
MD5
dd108215d60d63656303ca265f03fade
-
SHA1
4eb98302f26496e020dc62d927555d9ae880fb10
-
SHA256
af27bd7180ad756460e32f2ae56db7cbdc8a79e73a36b261a96f803e5b051fd5
-
SHA512
dfb474ed650e7f56261047a45a938ffcf6653d57f5cc3bb95ae4651af04f31b8056657d1ccf8229caf3af91d387fdc8a411d43833194d7ede6f9a897982e92f2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-