General
-
Target
4a52fbdd9532840dbb385e19d94458678140c46390b3a6f1de3a7e92ea5f5c54
-
Size
477KB
-
Sample
220521-n8q8caegg5
-
MD5
4b22a9ef13bf5f51035cfdebfb1f20d4
-
SHA1
a09415e30ee7c1bdb55f790722dc8ed56c8c8e4e
-
SHA256
4a52fbdd9532840dbb385e19d94458678140c46390b3a6f1de3a7e92ea5f5c54
-
SHA512
5bfa22b34b385aace42e2daa86119ab67b26f15853294009754ee1ff38e3f5a050c2cbd21811d11bcd45faa31bc37053eadb761e4033dcf4caca7c40f65b6243
Static task
static1
Behavioral task
behavioral1
Sample
INDUS INTL- RFQ(inquiry _list)pht.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
INDUS INTL- RFQ(inquiry _list)pht.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
sWalzdY4
Targets
-
-
Target
INDUS INTL- RFQ(inquiry _list)pht.exe
-
Size
682KB
-
MD5
9ad03cd97e4d83bf3bd9f1a2407a4242
-
SHA1
8f1ced189e835e117388cac76fc68b4810b22a94
-
SHA256
b2ac207f4af2ee08fd955e71ccfb0c95b07098f0dc88eb2fbe48fb9e1f52c022
-
SHA512
197ef4db7b2b205fb54bfff024466fa0e90e25ba8db0d59e0532088bb11950a75331c1c8bae212528a819e6315055df16aa60a972abc9fd20833bafe530e67f8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-