General
-
Target
13838A56D0A201699CD999FDFEA7450D09BCE9F89DB3DBD1AE0C007367DAAE82
-
Size
1.6MB
-
Sample
221208-yfqq8aeb7s
-
MD5
3d8b4cf11c96ecf1387250b460c1616a
-
SHA1
aea9be6f25cd28a2127322316c3700d811d559fb
-
SHA256
13838a56d0a201699cd999fdfea7450d09bce9f89db3dbd1ae0c007367daae82
-
SHA512
582cb6a06e0dfc96c1e4e38a646f72a935a86f7e3c433eb39e8fdab779d9dac3ede574cdd24f8a7c658bded0da46e4cbb81af9f0235b32c126fd9c23b07b0d7c
-
SSDEEP
24576:/Dgh/8zhJB6YuuWtE4gNHL6YxMTmuxnH2t:/ch/8lz6YN5PxcH2t
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT_EU.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SWIFT_EU.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mad-max.pila.pl - Port:
587 - Username:
[email protected] - Password:
JCbDYyer - Email To:
[email protected]
Targets
-
-
Target
SWIFT_EU.EXE
-
Size
1017KB
-
MD5
0bb87df8b4cc8098bae7d574c201d60f
-
SHA1
303518f8ee040aea50f9f9958294e315aec6cf77
-
SHA256
d2ca24f7ef22dfa8be6dc45ba0a64350d668bd0b9fb5a7be7d82305313d404bf
-
SHA512
9a11b65f91c0e561be42e1880336115ecb025acaff0e34ee13799215489e44f0ac648c6a92882a5ccb4c3d4385e4aa3adca7f6e9883248597e0a9490d4af6373
-
SSDEEP
24576:VDgh/8zhJB6YuuWtE4gNHL6YxMTmuxnH2t:Vch/8lz6YN5PxcH2t
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-