General
-
Target
c3fdc313fbe3c620f9f7ed163f47fb8f153cdd7fb3822b90f543627050ab4df2
-
Size
527KB
-
Sample
220521-nd4vysgfem
-
MD5
63fa7120b78e8168b19a55a5b01241ed
-
SHA1
3fd3e0929bf90d4d56335e92f2b16f8c413b86a7
-
SHA256
c3fdc313fbe3c620f9f7ed163f47fb8f153cdd7fb3822b90f543627050ab4df2
-
SHA512
0f73697cb23b5d9d77f2d90ff59c45dc3c75540ff83f93b2da7afde33e701878b4955704d1172cdb185f00b17a9bb5969cf941b05875a1bb2741952b4304f61f
Static task
static1
Behavioral task
behavioral1
Sample
BL & Original Shipping Documents AWB-62987268.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
BL & Original Shipping Documents AWB-62987268.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
drsaint1992101
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
drsaint1992101
Targets
-
-
Target
BL & Original Shipping Documents AWB-62987268.exe
-
Size
731KB
-
MD5
7236e60628c25d1b48ae9de6eb5e6b8c
-
SHA1
486cab73374fc98b369a1caf19bc2fc7c9285ad1
-
SHA256
8ac57ec0d32b453aa23a1c7149d5cd5695c8a99a9bd0b792bfc1411b1216c4da
-
SHA512
32e489c7ad82171d9349d7a89191d222aa3f784e462589345f3d1a010e63c024cd08232844d529d3396b60c505b3ef35f9378cea2c6efdd094e4b94c58d72873
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-