General
-
Target
New Order Request_0232147.exe
-
Size
1021KB
-
Sample
210504-1mysb6yk92
-
MD5
5133cbc9db4989d6fbb350e0829911c8
-
SHA1
72052feec6f9f94fe0831a77bdf8c3493d268e37
-
SHA256
fbdc2f9c6e970ae88ff30847c4d63472a0f0aa9b8e008e5b5c37f62ac526a963
-
SHA512
8f13f01160e182cb9169ebaffc97e48f1f84661c613370cf9c9c77dc39b4e8c1686a74cd4e438530e27970a0fe9c0465043434aad000f66b4469f9009c0807e1
Static task
static1
Behavioral task
behavioral1
Sample
New Order Request_0232147.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
New Order Request_0232147.exe
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iruberritechnologies.com - Port:
587 - Username:
calidad1@iruberritechnologies.com - Password:
Vpx7s4QHfJx7
Targets
-
-
Target
New Order Request_0232147.exe
-
Size
1021KB
-
MD5
5133cbc9db4989d6fbb350e0829911c8
-
SHA1
72052feec6f9f94fe0831a77bdf8c3493d268e37
-
SHA256
fbdc2f9c6e970ae88ff30847c4d63472a0f0aa9b8e008e5b5c37f62ac526a963
-
SHA512
8f13f01160e182cb9169ebaffc97e48f1f84661c613370cf9c9c77dc39b4e8c1686a74cd4e438530e27970a0fe9c0465043434aad000f66b4469f9009c0807e1
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
AgentTesla Payload
-
Suspicious use of SetThreadContext
-