General
-
Target
8a98251d21737443a4f65476f3e460569431094581b8a458b0a1bbb06f358114
-
Size
384KB
-
Sample
220521-n4rnbaefb5
-
MD5
78e638cd559da8a99e7b23ea03667998
-
SHA1
33e8b94d9f2b27543baaede37a3021238ddca423
-
SHA256
8a98251d21737443a4f65476f3e460569431094581b8a458b0a1bbb06f358114
-
SHA512
ed1cf40c2022e1737a91c5cf52d295b29107419ff791122b83d83008de2820896961a12d9731c253abcf2d69c7d32ae37e39e78109a6bafa5eda6a3d45780077
Static task
static1
Behavioral task
behavioral1
Sample
New Invoice.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
New Invoice.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rajapindah.com - Port:
587 - Username:
rizky@rajapindah.com - Password:
#r4j#citeureup#13
Targets
-
-
Target
New Invoice.exe
-
Size
417KB
-
MD5
ee2432ab09fc8dda38d558b392e68a71
-
SHA1
b9b8f01054cc7eac210012b7305c708a703960f4
-
SHA256
78dc559f3c971bf8fe5eb3f669a3b8de8c18313d2c466916fc32fd27ea352700
-
SHA512
66cbec40db972e9e27ffc1a74f7b59d3499736d8bd74a7822800e90d8f8d15438041c58b6b39d16f25e2cfb15d27f496642c10a26c8622d437d23056a0dd6833
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
AgentTesla Payload
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-