General
-
Target
SWIFT COPY.exe
-
Size
683KB
-
Sample
230518-3h4s3seb55
-
MD5
f8093ccda978921f5cfe758d29e5e14b
-
SHA1
898f8859caed79f460c235438981c45f976b2f6a
-
SHA256
3c603cfe391f9bca4778fcdf0f9d219faf8d062208df37275668eb5686f74f2b
-
SHA512
839158011bdd789d9dfbf12caad21ac002c86e64fc7d649ff1f85ad8fb1749beffed042d5e583551fecfd3ce67d6c7855c942a889340d3c37e22c957c92c8297
-
SSDEEP
12288:lXQ7FbA+pIYTaTlpQRroQhFdLUHDKL4+Q7pvLN:RpT8rfmj04z7pz
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT COPY.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SWIFT COPY.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
kV$bSqJ1 daniel - Email To:
[email protected]
Targets
-
-
Target
SWIFT COPY.exe
-
Size
683KB
-
MD5
f8093ccda978921f5cfe758d29e5e14b
-
SHA1
898f8859caed79f460c235438981c45f976b2f6a
-
SHA256
3c603cfe391f9bca4778fcdf0f9d219faf8d062208df37275668eb5686f74f2b
-
SHA512
839158011bdd789d9dfbf12caad21ac002c86e64fc7d649ff1f85ad8fb1749beffed042d5e583551fecfd3ce67d6c7855c942a889340d3c37e22c957c92c8297
-
SSDEEP
12288:lXQ7FbA+pIYTaTlpQRroQhFdLUHDKL4+Q7pvLN:RpT8rfmj04z7pz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-