General
-
Target
fbf730121ed0516a4726ded7dbcc1d0a7a43d11b4dc7b536992f59f9f394e148
-
Size
1016KB
-
Sample
210416-1ng8qhznxn
-
MD5
2b0b84ef617c7ad106b45ff2e571513c
-
SHA1
f7622624c01c4ac2266bf35953ba862e2cc6cf7a
-
SHA256
fbf730121ed0516a4726ded7dbcc1d0a7a43d11b4dc7b536992f59f9f394e148
-
SHA512
7ec805d403718f1b23a2fbf9979dc7c97d289c52b37acf3e5b2b25fe9474c3d0f23ce962edfd04887fa72cfd6df8498fc7430a1fa194f7ce6927ae6975607cfd
Static task
static1
Behavioral task
behavioral1
Sample
fbf730121ed0516a4726ded7dbcc1d0a7a43d11b4dc7b536992f59f9f394e148.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
fbf730121ed0516a4726ded7dbcc1d0a7a43d11b4dc7b536992f59f9f394e148.exe
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
gibson.1990
Targets
-
-
Target
fbf730121ed0516a4726ded7dbcc1d0a7a43d11b4dc7b536992f59f9f394e148
-
Size
1016KB
-
MD5
2b0b84ef617c7ad106b45ff2e571513c
-
SHA1
f7622624c01c4ac2266bf35953ba862e2cc6cf7a
-
SHA256
fbf730121ed0516a4726ded7dbcc1d0a7a43d11b4dc7b536992f59f9f394e148
-
SHA512
7ec805d403718f1b23a2fbf9979dc7c97d289c52b37acf3e5b2b25fe9474c3d0f23ce962edfd04887fa72cfd6df8498fc7430a1fa194f7ce6927ae6975607cfd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-