Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
file.exe
-
Size
216KB
-
MD5
2e1fcfb191508fc51320313d059bd30d
-
SHA1
18254fc83a340ca9562844542425ed7f995bff4a
-
SHA256
5dd60a5a2e5f074435cb438d3e229d1a3c4e4ef35c9c886a356b52aeb83265cd
-
SHA512
3c441d1ce951aa84af2a179372445aa89a10780e51742b3d77679cd831735416040c5dfe52b1644c6b71d885a80add0264310aba9a40fed9679bee69c5f497fd
Score
10/10
Malware Config
Extracted
Family
agenttesla
C2
http://64.188.18.218/webpanel-trade/inc/eea5c8636b504d.php
Signatures
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule sample family_agenttesla -
Agenttesla family
Files
-
file.exe.exe windows x86