General
-
Target
payment copy.exe
-
Size
940KB
-
Sample
221129-q7h7fshc7y
-
MD5
52fcd3f3cb7f0eaacc6cc393ba9313da
-
SHA1
5a7304f89ce6525e0449ffdf0022f5114d181680
-
SHA256
eeabb0a04ea59624d05185afbbf4a1c8e5db554c0c325871c4c0ac5de34c5547
-
SHA512
7ce8744c23b517043b25f173733888385be9fdaa67b597c3ec522d24d422ed1fee9a44cfa51c7c6c3812fbc2fd791fe57a822e3c0a462670448fb0ee507c54ec
-
SSDEEP
12288:yEhqU+PoxVZ861s4cEOSJJi0yIxYeQo//tdYV71JSYVBgrVDdzoa1cfN:LuoxL1MEPzyIBPY/JSMBgBDdEPf
Static task
static1
Behavioral task
behavioral1
Sample
payment copy.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
payment copy.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
host39.registrar-servers.com - Port:
587 - Username:
[email protected] - Password:
})cZs aj5Xr; C
Targets
-
-
Target
payment copy.exe
-
Size
940KB
-
MD5
52fcd3f3cb7f0eaacc6cc393ba9313da
-
SHA1
5a7304f89ce6525e0449ffdf0022f5114d181680
-
SHA256
eeabb0a04ea59624d05185afbbf4a1c8e5db554c0c325871c4c0ac5de34c5547
-
SHA512
7ce8744c23b517043b25f173733888385be9fdaa67b597c3ec522d24d422ed1fee9a44cfa51c7c6c3812fbc2fd791fe57a822e3c0a462670448fb0ee507c54ec
-
SSDEEP
12288:yEhqU+PoxVZ861s4cEOSJJi0yIxYeQo//tdYV71JSYVBgrVDdzoa1cfN:LuoxL1MEPzyIBPY/JSMBgBDdEPf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-