General
-
Target
623344972936ef938d926720ffe33dac5ff918a7e5bbab7aaca6611077e723b1
-
Size
611KB
-
Sample
220521-btpdzsfecl
-
MD5
83a32fcd629d41912975dfee3da2e2b4
-
SHA1
f256499d7691013dc26f292076916ab68fcca95d
-
SHA256
623344972936ef938d926720ffe33dac5ff918a7e5bbab7aaca6611077e723b1
-
SHA512
db285b39c0750d09a3ab99e19b34468269654d70a20c6e2d57fcd3217cd31f328022357e2b587c1e27c68a361f16cfe8e6a63169d5fa6758b2a24733b5e29c85
Static task
static1
Behavioral task
behavioral1
Sample
po no 10389 & 10390 - for 2 orders together.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
po no 10389 & 10390 - for 2 orders together.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
gnaeask@2015
Targets
-
-
Target
po no 10389 & 10390 - for 2 orders together.exe
-
Size
660KB
-
MD5
3e68b7ef28a3025b722831cd624cb2a8
-
SHA1
e176e6b0a34ecc203f30813e54a1ab8325297ab3
-
SHA256
37e399fce2caa80c9ea931f693b51a6d1c11464df1ead916cfca67f6100ad71f
-
SHA512
31fde62880b3e11a97832e09173231a2f0b9fe035cf04b705fd658be6439b7ffe16711e4fb1b2226b3dd440c1c7bbbcd243f4795cec03c34f8cc6e80edcaf857
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-