General
-
Target
doc07486620200116112353 pdf..exe
-
Size
582KB
-
Sample
200630-aa3nxlcazs
-
MD5
3c6eef45d23c93f32edaa81f6b7c8c54
-
SHA1
fcdfb605f8241f8dd1142f1c197ba56c4489dd38
-
SHA256
dfa098b2094107457d9bbe4511620001c72842c5c0240a3ab58989d5ebb49c97
-
SHA512
588c7bb8355963a4979d8ddf2e9aab07bd046e3a8b99db0d60e918e4d6d0d6f66c46a204c770e87e88feb6c420705cc6fdb6fbc6e053c7d68fa8c7b6c589ae32
Static task
static1
Behavioral task
behavioral1
Sample
doc07486620200116112353 pdf..exe
Resource
win7
Behavioral task
behavioral2
Sample
doc07486620200116112353 pdf..exe
Resource
win10v200430
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aquariuslogistics.com - Port:
587 - Username:
ajay@aquariuslogistics.com - Password:
AQL@2019#$
Targets
-
-
Target
doc07486620200116112353 pdf..exe
-
Size
582KB
-
MD5
3c6eef45d23c93f32edaa81f6b7c8c54
-
SHA1
fcdfb605f8241f8dd1142f1c197ba56c4489dd38
-
SHA256
dfa098b2094107457d9bbe4511620001c72842c5c0240a3ab58989d5ebb49c97
-
SHA512
588c7bb8355963a4979d8ddf2e9aab07bd046e3a8b99db0d60e918e4d6d0d6f66c46a204c770e87e88feb6c420705cc6fdb6fbc6e053c7d68fa8c7b6c589ae32
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-