General
-
Target
f744296570d39e6ddddbe45030d989f4
-
Size
1.1MB
-
Sample
210721-21hm7n7swe
-
MD5
f744296570d39e6ddddbe45030d989f4
-
SHA1
3c1caa09abe1c23ac8e4ee426bee7ab4b76a6c31
-
SHA256
9b0fd69ae3566f372e59db7964a9186d570aebf499d89294be290bfba0248fa4
-
SHA512
61ac6f6139cbd9cff33aa2d037035f4fdf2522286eb27a63f9b76d59b5445370cb31ec44e45af52139ac5b32f91905cf32d60f8450f76aa7fd5088cbd62a4d37
Static task
static1
Behavioral task
behavioral1
Sample
f744296570d39e6ddddbe45030d989f4.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
f744296570d39e6ddddbe45030d989f4.exe
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cisburo.com - Port:
587 - Username:
[email protected] - Password:
Essaab1967#
Targets
-
-
Target
f744296570d39e6ddddbe45030d989f4
-
Size
1.1MB
-
MD5
f744296570d39e6ddddbe45030d989f4
-
SHA1
3c1caa09abe1c23ac8e4ee426bee7ab4b76a6c31
-
SHA256
9b0fd69ae3566f372e59db7964a9186d570aebf499d89294be290bfba0248fa4
-
SHA512
61ac6f6139cbd9cff33aa2d037035f4fdf2522286eb27a63f9b76d59b5445370cb31ec44e45af52139ac5b32f91905cf32d60f8450f76aa7fd5088cbd62a4d37
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-