General
-
Target
Swift confirmation copy.exe
-
Size
1.1MB
-
Sample
221208-17x1qaef6x
-
MD5
fcd8c31d4cddc5ce08f1cc04b1588732
-
SHA1
b4b26d9674252eb6dcdafc00135761c142a8f210
-
SHA256
db32b295a5b8d07a8bf93cee250587b68d12e45141859c1f9a73552c572db41f
-
SHA512
e28a6ceb034de77abffb680b98da98b14329c8efbdc9b903d0ca42f1d1f5ecd9f431842cea023906e746e21e805c50054683b8a0a6003619b40c10491686dc34
-
SSDEEP
24576:qcbUAwJIbJ3lKyNw+mnB2vY0ISdriluWypJwB:qAUxSJUJn8ESdDW2JwB
Static task
static1
Behavioral task
behavioral1
Sample
Swift confirmation copy.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Swift confirmation copy.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.empoloshotel.co.ke - Port:
587 - Username:
[email protected] - Password:
9n4NJdr*&($E
Targets
-
-
Target
Swift confirmation copy.exe
-
Size
1.1MB
-
MD5
fcd8c31d4cddc5ce08f1cc04b1588732
-
SHA1
b4b26d9674252eb6dcdafc00135761c142a8f210
-
SHA256
db32b295a5b8d07a8bf93cee250587b68d12e45141859c1f9a73552c572db41f
-
SHA512
e28a6ceb034de77abffb680b98da98b14329c8efbdc9b903d0ca42f1d1f5ecd9f431842cea023906e746e21e805c50054683b8a0a6003619b40c10491686dc34
-
SSDEEP
24576:qcbUAwJIbJ3lKyNw+mnB2vY0ISdriluWypJwB:qAUxSJUJn8ESdDW2JwB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-