General
-
Target
be0db474a814c10a138d93e422cca70330437d23d9c838a0c08471e81bc8ad75
-
Size
389KB
-
Sample
220521-ps5lgafhh9
-
MD5
37c180fadf603fbcd7122e36e11edf6e
-
SHA1
7b0cc826299e8f626ec86a08c32d9bedc17c10a3
-
SHA256
be0db474a814c10a138d93e422cca70330437d23d9c838a0c08471e81bc8ad75
-
SHA512
a075b77eddf2c3aea3e633e90f37a6a229376db04d4a40b7533e94625bbc68973f3617b8a3fc519dc5624a5ec15a11a6ff8651ee9c053f65152e2b296a98bc1d
Static task
static1
Behavioral task
behavioral1
Sample
Payment Copy.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Payment Copy.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
francis@depie.net - Password:
payment1759
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
francis@depie.net - Password:
payment1759
Targets
-
-
Target
Payment Copy.exe
-
Size
469KB
-
MD5
c8b2f3ed20b96d896efed10bc72f4bc7
-
SHA1
0ffb6dbd026bc5287c25f916de027409732d774f
-
SHA256
576c49c08e0fdf319e6bd95e0f2f6aa92e2460e8b9032cfd732b51261f48b757
-
SHA512
4bd875483128845c4fca5bef793220cb7680065cafdf95222353150f2642d9215bdcff1d8d3d835a920d880b8ad36c1f24ef1cd4f778d77dce8dc411c1cffafe
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-