Static task
static1
Behavioral task
behavioral1
Sample
JMIRLlEMHBPEEQvrxjqCV.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
JMIRLlEMHBPEEQvrxjqCV.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
JMIRLlEMHBPEEQvrxjqCV.exe
-
Size
215KB
-
MD5
fd759dd1bc9fd7410275b3241e033056
-
SHA1
1b54a28e2733bb327613d9b28faf52bd03cecefe
-
SHA256
0ea5f38a33714a857aa46a7dd180fd85fea2e0eb1e919671d13b2fb5cae5296e
-
SHA512
cea6f4ec2f522d3ff09b87d04aa007bed81270eb99be443e35d32a52b00f781a57594e0b9a9cb1bd3721156e3acf9c7ba9c9f3113e55aaca1997c2bbd9e41221
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
SkoipkqHg0
Signatures
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule sample family_agenttesla -
Agenttesla family
Files
-
JMIRLlEMHBPEEQvrxjqCV.exe.exe windows x86