General
-
Target
7d2975cc47779537d37f1f2a4c492e8b38aa2e3fe8afdd2da17d2e0861c4814c
-
Size
395KB
-
Sample
220521-c53w7afae7
-
MD5
fb921a4bde561bbc6fb742227ca4aff1
-
SHA1
96fbe19e6fb32f945ead29f9fec22289f0a834cc
-
SHA256
7d2975cc47779537d37f1f2a4c492e8b38aa2e3fe8afdd2da17d2e0861c4814c
-
SHA512
8c3aa5297f4f53fdc068a4fee0eb584db0cc228af3646a952af7625a4cf6171a8c3d722e8fac215c6479ee25adfb25476135a47903b69c78fc4a89b26e9d084a
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rajapindah.com - Port:
587 - Username:
[email protected] - Password:
#r4j#citeureup#13
Targets
-
-
Target
SOA.exe
-
Size
488KB
-
MD5
5e60ef56b469a00033010400dfd0b8a8
-
SHA1
32995e5ad69e62e01512bbc90c163f1c7f1a8805
-
SHA256
7da5b2a2701aa912c1e3b5d76bc926d9a446e6fcbd965bf2781d4653cc453d47
-
SHA512
de95f417bb3fca636c52f12740324d57e6831a3bb94672b0cfe508db85eff2f2be6564fbafd76aa91809dce612bbb78f110f394ac859f44228838fa208eeb6de
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
AgentTesla Payload
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-