General
-
Target
Payment Swift USD18,000.exe
-
Size
841KB
-
Sample
230317-jjnnpsgh8y
-
MD5
cb4f52bfbd20524cd1e593e3d144b437
-
SHA1
b0a969cc5823930321ee787ef1308352e40d2131
-
SHA256
336c6e2174453e52f6c8f72ff0b886011c5ab0d497b357de19b393d7c22214e8
-
SHA512
c3d3197c1be34dff339c5d836ba8eead12074cb71913734235437767e62f9eec3fec389360aa7db11e59fe702be9c69b261bc5705d307468c36a3831247099c7
-
SSDEEP
12288:rzC++IpjkjXyuaqZM+3pUH4mrVs239gWwvhDWs3tdc9jyT4p00gAEy5aB+AEZzis:gwjkj+UMsUH4m+1vJWSdcgTqSPFMBxV
Static task
static1
Behavioral task
behavioral1
Sample
Payment Swift USD18,000.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Payment Swift USD18,000.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.focuzpartsmart.com - Port:
587 - Username:
[email protected] - Password:
FpmJhn@2023 - Email To:
[email protected]
Targets
-
-
Target
Payment Swift USD18,000.exe
-
Size
841KB
-
MD5
cb4f52bfbd20524cd1e593e3d144b437
-
SHA1
b0a969cc5823930321ee787ef1308352e40d2131
-
SHA256
336c6e2174453e52f6c8f72ff0b886011c5ab0d497b357de19b393d7c22214e8
-
SHA512
c3d3197c1be34dff339c5d836ba8eead12074cb71913734235437767e62f9eec3fec389360aa7db11e59fe702be9c69b261bc5705d307468c36a3831247099c7
-
SSDEEP
12288:rzC++IpjkjXyuaqZM+3pUH4mrVs239gWwvhDWs3tdc9jyT4p00gAEy5aB+AEZzis:gwjkj+UMsUH4m+1vJWSdcgTqSPFMBxV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-