General
-
Target
july9c.exe
-
Size
933KB
-
Sample
200709-jfhkb71kyj
-
MD5
7234d5d573d7f174982cdf15250fde86
-
SHA1
8a10dccdd03b70d1e35e9fb1d5c0aa4570b0c3d8
-
SHA256
fcbb5d4d6c4a961d1faf8ffd19547765cc67b6cb7d6ac05006ef651c55d66774
-
SHA512
cb0cde65ab26cd3c241381929e4bc45e93de7bab0e51d39bcadb941c0dced8fd43ed2d944d241ec6bad58928581ea02ad686d268ecc74b3cd6c789ed95ee2389
Static task
static1
Behavioral task
behavioral1
Sample
july9c.exe
Resource
win7
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
general1248
Targets
-
-
Target
july9c.exe
-
Size
933KB
-
MD5
7234d5d573d7f174982cdf15250fde86
-
SHA1
8a10dccdd03b70d1e35e9fb1d5c0aa4570b0c3d8
-
SHA256
fcbb5d4d6c4a961d1faf8ffd19547765cc67b6cb7d6ac05006ef651c55d66774
-
SHA512
cb0cde65ab26cd3c241381929e4bc45e93de7bab0e51d39bcadb941c0dced8fd43ed2d944d241ec6bad58928581ea02ad686d268ecc74b3cd6c789ed95ee2389
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-