General
-
Target
128c4f65460a7f4bda3b0eb0dd712fb5d4f2416f0dceb9c5f1450c8a0e90dcc9
-
Size
398KB
-
Sample
220521-dz43qsgfb6
-
MD5
883cf18ed393f74b3ffc763a5806d1aa
-
SHA1
1578578577b3ef35c92b4a4dcee05390a1697180
-
SHA256
128c4f65460a7f4bda3b0eb0dd712fb5d4f2416f0dceb9c5f1450c8a0e90dcc9
-
SHA512
3d097917ce70c4a63ecd3d4e6cc10746a6300f173b07987c36a85294c639911194492935fc49d2b9e7b7946ebc1cd3cbd4956ada4980b4c02828324c1a3bf865
Static task
static1
Behavioral task
behavioral1
Sample
PMR#RFQ_PRICE.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PMR#RFQ_PRICE.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pptoursperu.com - Port:
587 - Username:
info@pptoursperu.com - Password:
mailppt2019-
Targets
-
-
Target
PMR#RFQ_PRICE.exe
-
Size
453KB
-
MD5
0e4fb8706e3ca9107418ed4eafa7964d
-
SHA1
fb9eabee69465bcb99d693aeb702c176a164e115
-
SHA256
f982ec93d003591286335c98074fdbe2054d603de5211af961c670f50ac3437d
-
SHA512
c0f3b96eb96f99aa7735bffa78be3c2523ee50acd0535c3a0dd14dc42a8d7a21bd6d1298b5677347a8ca793aa79637dbebcc098c3c11700cd9564e5b05c40d2b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
AgentTesla Payload
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-