General
-
Target
swift copy.exe
-
Size
698KB
-
Sample
230523-pbfk1sga8x
-
MD5
bc2cf4b71930552ee4ef6497ee4e9ff9
-
SHA1
ee6102e4339928af85d80b6954c95441fd9c0420
-
SHA256
c2c8a9ff34e44aa56b6b40408726329e1e8e31c0e5f97d0c0849224a9c4cebb5
-
SHA512
dff3285e613115924016c1705a3e675b9b17011d6a3acb2c17c50669923974d294a23831c51d0c76d0bce07237e430962196bd4b2afd51b18b7a6ebdf63a157c
-
SSDEEP
12288:tvV+s1bSQT6tjjdB4bEOub2mWGHUAFdV9HQBPgYsQoAJItTTmEnrREjodrdODIj:ttF5ub22U+wrsQoAiVThrhdr8Dw
Static task
static1
Behavioral task
behavioral1
Sample
swift copy.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
swift copy.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.strictfacilityservices.com - Port:
587 - Username:
[email protected] - Password:
SFS!@#321 - Email To:
[email protected]
Targets
-
-
Target
swift copy.exe
-
Size
698KB
-
MD5
bc2cf4b71930552ee4ef6497ee4e9ff9
-
SHA1
ee6102e4339928af85d80b6954c95441fd9c0420
-
SHA256
c2c8a9ff34e44aa56b6b40408726329e1e8e31c0e5f97d0c0849224a9c4cebb5
-
SHA512
dff3285e613115924016c1705a3e675b9b17011d6a3acb2c17c50669923974d294a23831c51d0c76d0bce07237e430962196bd4b2afd51b18b7a6ebdf63a157c
-
SSDEEP
12288:tvV+s1bSQT6tjjdB4bEOub2mWGHUAFdV9HQBPgYsQoAJItTTmEnrREjodrdODIj:ttF5ub22U+wrsQoAiVThrhdr8Dw
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-