General
-
Target
BuXml0xOJlFXusF.exe
-
Size
551KB
-
Sample
210226-lk5bb7p7hn
-
MD5
2b83697e842ccf54a72b2ca68f44947b
-
SHA1
b7aacc8139ee8c4d74b507c1435e0fb04d6a0a99
-
SHA256
62b54609bea9a6af4f71daa41bfaeb75235f662d608480020257a9eba7255dd4
-
SHA512
d3028843f5a46344379a1915bb0eaa0850571778ae5b763fa1c8de1e065ff165fdd78a6327076768b46921266e27c7720c157ab80b79b3ca1cc7fe1cdec38da0
Static task
static1
Behavioral task
behavioral1
Sample
BuXml0xOJlFXusF.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
BuXml0xOJlFXusF.exe
Resource
win10v20201028
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iymorenterprizelogs.com - Port:
587 - Username:
[email protected] - Password:
nxLq9soWurW3
Targets
-
-
Target
BuXml0xOJlFXusF.exe
-
Size
551KB
-
MD5
2b83697e842ccf54a72b2ca68f44947b
-
SHA1
b7aacc8139ee8c4d74b507c1435e0fb04d6a0a99
-
SHA256
62b54609bea9a6af4f71daa41bfaeb75235f662d608480020257a9eba7255dd4
-
SHA512
d3028843f5a46344379a1915bb0eaa0850571778ae5b763fa1c8de1e065ff165fdd78a6327076768b46921266e27c7720c157ab80b79b3ca1cc7fe1cdec38da0
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Suspicious use of SetThreadContext
-