General
-
Target
EHM(R)-6E-0.D.exe
-
Size
573KB
-
Sample
210419-t5sm5jlbpn
-
MD5
6758dcc71978ee960955f011a99138c0
-
SHA1
24964300243026de487f66dfbed1e1eb75b63500
-
SHA256
b8e4c54f15ac8fc84223e2460f6201401c960851b4006d61360caa57c34af3ed
-
SHA512
635655c4b67bddce66073a6e5e3cb673af437bee6e424aa646b76c44b9177e36c74d260ddf4c2cfc32f2db0aae92d74b68e1bca6d6ff0c4b45c119175bd6520b
Static task
static1
Behavioral task
behavioral1
Sample
EHM(R)-6E-0.D.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
EHM(R)-6E-0.D.exe
Resource
win10v20210408
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.mdist.us - Port:
587 - Username:
[email protected] - Password:
Jg#4321
Targets
-
-
Target
EHM(R)-6E-0.D.exe
-
Size
573KB
-
MD5
6758dcc71978ee960955f011a99138c0
-
SHA1
24964300243026de487f66dfbed1e1eb75b63500
-
SHA256
b8e4c54f15ac8fc84223e2460f6201401c960851b4006d61360caa57c34af3ed
-
SHA512
635655c4b67bddce66073a6e5e3cb673af437bee6e424aa646b76c44b9177e36c74d260ddf4c2cfc32f2db0aae92d74b68e1bca6d6ff0c4b45c119175bd6520b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-