General
-
Target
Original invoice.exe
-
Size
799KB
-
Sample
200712-wldh3d8z76
-
MD5
903746d6c18aef7b3acbf91fb0b1ba11
-
SHA1
7712236e9d81cc5654023d7a21b0a518ea2b53d9
-
SHA256
1debc399539d6dddfa7522dbf42b2ade7d0e56179588fae9f144301a84629e50
-
SHA512
794e32b00aeda08552e8c05a94ded42b135f605d86dfe0d9d8f4cdbc0630226d1f957913d555f50efc638499aa75c8cad924cf1158bb96f9232d29fe0b4eb18a
Static task
static1
Behavioral task
behavioral1
Sample
Original invoice.exe
Resource
win7
Behavioral task
behavioral2
Sample
Original invoice.exe
Resource
win10v200430
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.amberresidenceng.com - Port:
587 - Username:
reservations@amberresidenceng.com - Password:
Amber_2017
Targets
-
-
Target
Original invoice.exe
-
Size
799KB
-
MD5
903746d6c18aef7b3acbf91fb0b1ba11
-
SHA1
7712236e9d81cc5654023d7a21b0a518ea2b53d9
-
SHA256
1debc399539d6dddfa7522dbf42b2ade7d0e56179588fae9f144301a84629e50
-
SHA512
794e32b00aeda08552e8c05a94ded42b135f605d86dfe0d9d8f4cdbc0630226d1f957913d555f50efc638499aa75c8cad924cf1158bb96f9232d29fe0b4eb18a
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-