General
-
Target
DUBAI DEH3231COD.exe
-
Size
823KB
-
Sample
210420-kvz1cr2sbx
-
MD5
170e81d276c5d1495b5f742c74df2903
-
SHA1
97c0bfecf5971aa3396652d845c2268c35b25381
-
SHA256
5e4efbd4ced4af5859b50e911dce466d8e1d4d84077598513858c2011e6c82b6
-
SHA512
71e2e0bcbd16d32b4aeab991fa48281f4e201438aa0457da99db22cbcbbda7b5262b7992b0cbb8fe61c0b100ada57254f28a5a09e737aca92f1bb78bf9c2e16e
Static task
static1
Behavioral task
behavioral1
Sample
DUBAI DEH3231COD.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
DUBAI DEH3231COD.exe
Resource
win10v20210408
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.satguruclearing.com - Port:
587 - Username:
[email protected] - Password:
satguru@9939*
Targets
-
-
Target
DUBAI DEH3231COD.exe
-
Size
823KB
-
MD5
170e81d276c5d1495b5f742c74df2903
-
SHA1
97c0bfecf5971aa3396652d845c2268c35b25381
-
SHA256
5e4efbd4ced4af5859b50e911dce466d8e1d4d84077598513858c2011e6c82b6
-
SHA512
71e2e0bcbd16d32b4aeab991fa48281f4e201438aa0457da99db22cbcbbda7b5262b7992b0cbb8fe61c0b100ada57254f28a5a09e737aca92f1bb78bf9c2e16e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-