General
-
Target
payment swift.exe
-
Size
924KB
-
Sample
221208-xzx4zaba87
-
MD5
b6dba866f24d460a4aefb0f590138c89
-
SHA1
0525367476774b82fc2aab18d647d43fa6e6fa43
-
SHA256
3d63832817a34bfe4f72a9f22ab220254b00578bbdc0dbabed657207a3c6af1b
-
SHA512
ef193c650aba60646ad76c5ba77bef248b0542681fa4d5759a5ed30f6140eadb302808148f56ae8af5d220fd676a53b101079afe21d849ef17308dd1b11b174c
-
SSDEEP
24576:YSXDdEPf7qmuiKpY+Xj84LmeYA2FVeM5oZUqGgEhGO:BmPWpTz84Lzwz5Zbg0
Static task
static1
Behavioral task
behavioral1
Sample
payment swift.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
payment swift.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
Protocol: smtp- Host:
host39.registrar-servers.com - Port:
587 - Username:
[email protected] - Password:
MI{ml&po^Oii 123
Extracted
agenttesla
Protocol: smtp- Host:
host39.registrar-servers.com - Port:
587 - Username:
[email protected] - Password:
MI{ml&po^Oii 123
Targets
-
-
Target
payment swift.exe
-
Size
924KB
-
MD5
b6dba866f24d460a4aefb0f590138c89
-
SHA1
0525367476774b82fc2aab18d647d43fa6e6fa43
-
SHA256
3d63832817a34bfe4f72a9f22ab220254b00578bbdc0dbabed657207a3c6af1b
-
SHA512
ef193c650aba60646ad76c5ba77bef248b0542681fa4d5759a5ed30f6140eadb302808148f56ae8af5d220fd676a53b101079afe21d849ef17308dd1b11b174c
-
SSDEEP
24576:YSXDdEPf7qmuiKpY+Xj84LmeYA2FVeM5oZUqGgEhGO:BmPWpTz84Lzwz5Zbg0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-