General
-
Target
The details for your perusal.exe
-
Size
558KB
-
Sample
200709-qkrskt39ma
-
MD5
35f7b91f31292e3c9a4d187e9a4bd4b6
-
SHA1
00cf753c6fc011df51acf181cb6e79dc31f35171
-
SHA256
7d3068aff051388b3332905ca9a26a10a1cd96441e3be9d908cd839088cc9d65
-
SHA512
0b03a1f9efeb651a4f527d66d84572bad7fbb9a4379169910a2674fe54a2d1b19a36dc34cb54d71aa0c8a09b44035f6dd917041f17353e1d81dc31e62bc37bd9
Static task
static1
Behavioral task
behavioral1
Sample
The details for your perusal.exe
Resource
win7
Behavioral task
behavioral2
Sample
The details for your perusal.exe
Resource
win10v200430
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.emailsrvr.com - Port:
587 - Username:
[email protected] - Password:
31081985@
Targets
-
-
Target
The details for your perusal.exe
-
Size
558KB
-
MD5
35f7b91f31292e3c9a4d187e9a4bd4b6
-
SHA1
00cf753c6fc011df51acf181cb6e79dc31f35171
-
SHA256
7d3068aff051388b3332905ca9a26a10a1cd96441e3be9d908cd839088cc9d65
-
SHA512
0b03a1f9efeb651a4f527d66d84572bad7fbb9a4379169910a2674fe54a2d1b19a36dc34cb54d71aa0c8a09b44035f6dd917041f17353e1d81dc31e62bc37bd9
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Suspicious use of SetThreadContext
-