General
-
Target
e5424082645fda55cc5d4e0192834afe.exe
-
Size
1.5MB
-
Sample
210308-w19dmhrr3e
-
MD5
e5424082645fda55cc5d4e0192834afe
-
SHA1
dfd934ffb08081496d896464f6b50a7b750f0845
-
SHA256
0ecfbf08398e1d0470c2f4d40a490808bd1b177cb60d674c5459d85f242952ab
-
SHA512
1724662c74221824d71ebf6d277ded559b404fb3acd5fdbc2f18e23dd147e65d3f7613e33a696803a78a2a89f923b2e57482103f7ec2a85f3fa6c80c4aad62f7
Static task
static1
Behavioral task
behavioral1
Sample
e5424082645fda55cc5d4e0192834afe.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
e5424082645fda55cc5d4e0192834afe.exe
Resource
win10v20201028
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
slcezbamxkbpjjjh
Targets
-
-
Target
e5424082645fda55cc5d4e0192834afe.exe
-
Size
1.5MB
-
MD5
e5424082645fda55cc5d4e0192834afe
-
SHA1
dfd934ffb08081496d896464f6b50a7b750f0845
-
SHA256
0ecfbf08398e1d0470c2f4d40a490808bd1b177cb60d674c5459d85f242952ab
-
SHA512
1724662c74221824d71ebf6d277ded559b404fb3acd5fdbc2f18e23dd147e65d3f7613e33a696803a78a2a89f923b2e57482103f7ec2a85f3fa6c80c4aad62f7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-