General
-
Target
AWB 673687387678.EXE
-
Size
425KB
-
Sample
200707-6t5t4zr82n
-
MD5
7851f2d356ca57acbbb7c6ad51bbfab7
-
SHA1
6f956b2b4abf02bd5dad579f9cd102c5cf1ae61c
-
SHA256
935e5bb0fe7441931cbc606436d22e48c1990f2b421c14980b1cd5ae4eaf9975
-
SHA512
1203c3939c0566df9a359fc7757f9e691d642238b1f9d20eef6eab07accb9fd8848c5e7f7674d404d41a6cb35e9ce341fdb850d874694946b6c25fe99bbcee78
Static task
static1
Behavioral task
behavioral1
Sample
AWB 673687387678.EXE
Resource
win7
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.papayatreehotels.com - Port:
587 - Username:
[email protected] - Password:
tree1579
Targets
-
-
Target
AWB 673687387678.EXE
-
Size
425KB
-
MD5
7851f2d356ca57acbbb7c6ad51bbfab7
-
SHA1
6f956b2b4abf02bd5dad579f9cd102c5cf1ae61c
-
SHA256
935e5bb0fe7441931cbc606436d22e48c1990f2b421c14980b1cd5ae4eaf9975
-
SHA512
1203c3939c0566df9a359fc7757f9e691d642238b1f9d20eef6eab07accb9fd8848c5e7f7674d404d41a6cb35e9ce341fdb850d874694946b6c25fe99bbcee78
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-