General
-
Target
66fd196da9450559a1bb2978b2dc1324.exe
-
Size
634KB
-
Sample
200707-j3vv9wbvmn
-
MD5
66fd196da9450559a1bb2978b2dc1324
-
SHA1
9f857087456c97052847893f1e25ab5aca71bcc9
-
SHA256
0836c887bfe4e33f8b3d94ce158a4af9430a7a461510cb074b1518fb3d340cb5
-
SHA512
16fda62d7754afb1407989ea2c1ab9714f02d4ea48b5b56fa41d964cc426670d693fc3940d932d49bd6b1ed533b73eff2c87af9a936da96e424da094da7c32b6
Static task
static1
Behavioral task
behavioral1
Sample
66fd196da9450559a1bb2978b2dc1324.exe
Resource
win7
Behavioral task
behavioral2
Sample
66fd196da9450559a1bb2978b2dc1324.exe
Resource
win10v200430
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.faithhopaendimages.com - Port:
587 - Username:
[email protected] - Password:
UdWklww7
Targets
-
-
Target
66fd196da9450559a1bb2978b2dc1324.exe
-
Size
634KB
-
MD5
66fd196da9450559a1bb2978b2dc1324
-
SHA1
9f857087456c97052847893f1e25ab5aca71bcc9
-
SHA256
0836c887bfe4e33f8b3d94ce158a4af9430a7a461510cb074b1518fb3d340cb5
-
SHA512
16fda62d7754afb1407989ea2c1ab9714f02d4ea48b5b56fa41d964cc426670d693fc3940d932d49bd6b1ed533b73eff2c87af9a936da96e424da094da7c32b6
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-