General
-
Target
7eeb8828ee5ed169af5f8ce9cd07e6a4bc3fcb2e548e9e01378a02fbcee7c680
-
Size
461KB
-
Sample
220521-n6j19aefh5
-
MD5
88f7dd8dc78807b8a93c7a65d473b999
-
SHA1
9596827fed499ad9a3cc4524c44e63fea38ab87f
-
SHA256
7eeb8828ee5ed169af5f8ce9cd07e6a4bc3fcb2e548e9e01378a02fbcee7c680
-
SHA512
82554a66c2d9f730740ed7c3fc506fc344d96cf79e67108f1e52e64a56362485532a36d6cd65fdbcc8fcfa1e6d31667a3510373f331c4a7e39d557ca66f70519
Behavioral task
behavioral1
Sample
PURCHASE LIST.exe
Resource
win7-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mentorpublishing.co.ke - Port:
587 - Username:
[email protected] - Password:
Sam072493
Targets
-
-
Target
PURCHASE LIST.exe
-
Size
509KB
-
MD5
84bd92a1862e1c85ce69e671f74fa6e1
-
SHA1
7fa8144f716efef6b201b12672aa21882f6e1428
-
SHA256
07d6953a68436385a5c78086ae9cf68fb5f5e44adeb6333f84aaa0ffd94a0ed5
-
SHA512
ae488f9a861febe9fd96b9b44e8faf91cf8dc2c2a49f32e400a7b6e58a68a46a75a640a64985ba47818af21e7687be43676616ca7d788a71bb4f80cd5c33da04
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
AgentTesla Payload
-
Contains SnakeBOT related strings
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-