General
-
Target
32027444.jpg
-
Size
340KB
-
Sample
200713-sklhatgqsn
-
MD5
b5552041f02602b6fa8faa9ccd590ea2
-
SHA1
21e742f91ab44673f5cc14b82c18f359a127c670
-
SHA256
3b13bf8c3de862a6914cf5a9eb0539e0046faf3e62e7d2f0fb63001e8dd2b5a3
-
SHA512
124867cbf5d87fc077ed2537f71f47311064ab64558bf5dac59e27acc8ef3e7f372cf307e90da313ebb8864d246f418f9e45efeefd11a5bd945501ffd0558e9f
Static task
static1
Behavioral task
behavioral1
Sample
32027444.jpg.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
32027444.jpg.exe
Resource
win10
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
HYF76io83%$6
Targets
-
-
Target
32027444.jpg
-
Size
340KB
-
MD5
b5552041f02602b6fa8faa9ccd590ea2
-
SHA1
21e742f91ab44673f5cc14b82c18f359a127c670
-
SHA256
3b13bf8c3de862a6914cf5a9eb0539e0046faf3e62e7d2f0fb63001e8dd2b5a3
-
SHA512
124867cbf5d87fc077ed2537f71f47311064ab64558bf5dac59e27acc8ef3e7f372cf307e90da313ebb8864d246f418f9e45efeefd11a5bd945501ffd0558e9f
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-