General
-
Target
1221000880.pdf.exe
-
Size
807KB
-
Sample
210423-h1133h7cm2
-
MD5
51cc9ef1470b1a132b0c8555bb204291
-
SHA1
d54e8fb1eef02ec6c1c4d246c912ebfd82bb0e67
-
SHA256
4618f55b6482e1d13e798ed1045deb42ab9efb04c1e16a2313d62f1ec6d9ef43
-
SHA512
359b084cb6f27a48793b1554078197786a7d3f6ddf514263c8264cfda9708a4ea80f667f36bfa604c503da98fb44529064b1ce4201bc0c0b1fe6f1f6a09df072
Static task
static1
Behavioral task
behavioral1
Sample
1221000880.pdf.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
1221000880.pdf.exe
Resource
win10v20210408
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
cspuri@searchnet.co.in - Password:
22june1969
Targets
-
-
Target
1221000880.pdf.exe
-
Size
807KB
-
MD5
51cc9ef1470b1a132b0c8555bb204291
-
SHA1
d54e8fb1eef02ec6c1c4d246c912ebfd82bb0e67
-
SHA256
4618f55b6482e1d13e798ed1045deb42ab9efb04c1e16a2313d62f1ec6d9ef43
-
SHA512
359b084cb6f27a48793b1554078197786a7d3f6ddf514263c8264cfda9708a4ea80f667f36bfa604c503da98fb44529064b1ce4201bc0c0b1fe6f1f6a09df072
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Suspicious use of SetThreadContext
-