General
-
Target
Order Sampes.exe
-
Size
869KB
-
Sample
210721-7c3za7t19s
-
MD5
4665cef694a2aaefcc4036296b7bdb3b
-
SHA1
0e3b9e4986bbd83379279300ea7b4ca94da1ca9d
-
SHA256
b9e9f771cae186309b6e5f0d4fa06a06b80d610a18804bb8e495881a4ebb459e
-
SHA512
f30624f24ef7f3bdf70916a862a01008494f7cf30578b4f55a24ad697dfad0c60d3074ad835bcc2783e86f2cd6e6f2e56b06d0f8a96f9863739b8532b3b08d08
Static task
static1
Behavioral task
behavioral1
Sample
Order Sampes.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Order Sampes.exe
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
1siG~gog~Z*9
Targets
-
-
Target
Order Sampes.exe
-
Size
869KB
-
MD5
4665cef694a2aaefcc4036296b7bdb3b
-
SHA1
0e3b9e4986bbd83379279300ea7b4ca94da1ca9d
-
SHA256
b9e9f771cae186309b6e5f0d4fa06a06b80d610a18804bb8e495881a4ebb459e
-
SHA512
f30624f24ef7f3bdf70916a862a01008494f7cf30578b4f55a24ad697dfad0c60d3074ad835bcc2783e86f2cd6e6f2e56b06d0f8a96f9863739b8532b3b08d08
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Suspicious use of SetThreadContext
-