General
-
Target
rPaymentadviceCopy.exe
-
Size
266KB
-
Sample
230523-pnqxhsfc23
-
MD5
1bdc92c6032c5a3e213219a52b02614c
-
SHA1
5d613f1ff792001fe0e5ccb25dafcac19d7f1e30
-
SHA256
77c9dd35383ca4e112e723c8611624e78322eb2a4b3ca66f0d5f1e3f92f0c299
-
SHA512
061af20a0eb3a9ff877eae7c411accaf66ec12c44ed0fecdbe97da67e1c1657df6dfb8a9428e88bd4d23f43eb2d80c7108a51a2610d24c29187a3468349202ad
-
SSDEEP
6144:vYa6yhVSR5aYh90H4QaRlj3TDfuz7CPNTQa+NbEeKXoAg:vYUy7B9YmVfuuV8tNbEeKXG
Static task
static1
Behavioral task
behavioral1
Sample
rPaymentadviceCopy.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
rPaymentadviceCopy.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
rPaymentadviceCopy.exe
-
Size
266KB
-
MD5
1bdc92c6032c5a3e213219a52b02614c
-
SHA1
5d613f1ff792001fe0e5ccb25dafcac19d7f1e30
-
SHA256
77c9dd35383ca4e112e723c8611624e78322eb2a4b3ca66f0d5f1e3f92f0c299
-
SHA512
061af20a0eb3a9ff877eae7c411accaf66ec12c44ed0fecdbe97da67e1c1657df6dfb8a9428e88bd4d23f43eb2d80c7108a51a2610d24c29187a3468349202ad
-
SSDEEP
6144:vYa6yhVSR5aYh90H4QaRlj3TDfuz7CPNTQa+NbEeKXoAg:vYUy7B9YmVfuuV8tNbEeKXG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-