General
-
Target
bd12432d658fd852cc811d97ae1b0363200eea090d672dfa266878fd6fbb84b5
-
Size
359KB
-
Sample
220521-cnxc3secb5
-
MD5
4cd72604fd60fbc2086c98e8d5f5d036
-
SHA1
a10f51bf73e8d07c78b11bce6860c4f2c468410e
-
SHA256
bd12432d658fd852cc811d97ae1b0363200eea090d672dfa266878fd6fbb84b5
-
SHA512
bf1157a7de4cc725c190e9f7449e42ca13b38f2d7f639bc9c4e94d84669349eda9a545bd4787d36e240fe766ffcb53bbc3ba06e3ddc79d5eebf3557cb5fce06f
Static task
static1
Behavioral task
behavioral1
Sample
citat.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
citat.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
SENEGAL12345
Targets
-
-
Target
citat.exe
-
Size
507KB
-
MD5
4c0812477679e4c34663933be5c5f9fb
-
SHA1
3c3df6e2bb55f8870b9eb9da60008ea58972a20e
-
SHA256
66b15ee82b31364bbb038c7a2f60fac0057d01b0865b2b71a4418293fc9e056d
-
SHA512
35868df44b9faf661bd916d5210e5229863838d609f2056f1b6da9e148d588dba5516aa296adad2f42f74e9b13d7ece042b26424820b038025106fb7f0822aa4
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-