General
-
Target
6acdb4a3fd233c48f59b7dee0cf9a91a7fc41a64d18b7a5a964f340a306731cc
-
Size
398KB
-
Sample
220521-ne9gtsggbp
-
MD5
19e996d79c88d8e08ede5d107489b4de
-
SHA1
16b42492e362950da74a7192acb550cfdf3586f3
-
SHA256
6acdb4a3fd233c48f59b7dee0cf9a91a7fc41a64d18b7a5a964f340a306731cc
-
SHA512
58b5217c69e0731a7e60137083ddde562e231588b6d94b0d9d7555203af2add2bb082c44e2b4596678f254cf4e777671670660c74d035a2ee023dfd2c28fbe7d
Static task
static1
Behavioral task
behavioral1
Sample
Payment Invoice.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Payment Invoice.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
mmm777
Extracted
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
mmm777
Targets
-
-
Target
Payment Invoice.exe
-
Size
556KB
-
MD5
53ec9b92d822d12887d144d5e2066bef
-
SHA1
ef55bbcab42a3ef5ee0070adf2b1c176dfeea4d0
-
SHA256
1a32b479225283f435fe37ea7490bd319063d0cbf88ba6845821aa4eadbbdc91
-
SHA512
6685ca80b210e740bac3a0910c803b27dac2840a9b17c24dd0256b8afbce7cbb063b713e63f488179979e118434ca8ea49f542f414e1c402f71462897f705d7b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-