General
-
Target
Order152020.exe
-
Size
439KB
-
Sample
200715-nt8e5y1yf6
-
MD5
bdad7cf32c55233a29a52feba81f140e
-
SHA1
464219a09f61e119e532fbacba58259ee7b06299
-
SHA256
7341780b5a914f5cf26fee6fecfa59380432fe6da8ad4aeb5bc9e83836991b1a
-
SHA512
32a56224e62319eeaa1f2467a8f502ee0b764912c55a24d1cc114f7dbc8ec9a7738eb737c362e641e3eb1b4988332d49b3b81ea981507a24cfc07f44296f6c73
Static task
static1
Behavioral task
behavioral1
Sample
Order152020.exe
Resource
win7
Behavioral task
behavioral2
Sample
Order152020.exe
Resource
win10
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
anyanwu3116
Targets
-
-
Target
Order152020.exe
-
Size
439KB
-
MD5
bdad7cf32c55233a29a52feba81f140e
-
SHA1
464219a09f61e119e532fbacba58259ee7b06299
-
SHA256
7341780b5a914f5cf26fee6fecfa59380432fe6da8ad4aeb5bc9e83836991b1a
-
SHA512
32a56224e62319eeaa1f2467a8f502ee0b764912c55a24d1cc114f7dbc8ec9a7738eb737c362e641e3eb1b4988332d49b3b81ea981507a24cfc07f44296f6c73
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-