General
-
Target
Inv_7623980.r15
-
Size
381KB
-
Sample
210721-b7xvcpt17n
-
MD5
ee2c45884c328d1da2b4644bd53ad3b7
-
SHA1
b814a1aeac1a3949269b3cc12694f067126d6b2f
-
SHA256
5562cf5618942d43bb59a893bb14f3bb1b45e98550a1bc82a4a75a4b5e504e23
-
SHA512
1a1b9a49e026700015ce08bf2d6fbbe744459e84f030f378db93df06279536ae2b3442c4bcb93bbe44052c5b945d52e285f3c3121855e3366cb36e9751e915a7
Static task
static1
Behavioral task
behavioral1
Sample
Inv_7623980.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Inv_7623980.exe
Resource
win10v20210408
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.shivsundaram.com - Port:
587 - Username:
[email protected] - Password:
hemant@10023
Targets
-
-
Target
Inv_7623980.exe
-
Size
930KB
-
MD5
af3a59ad59b90cdbb755d2226f07d2f2
-
SHA1
da66f2c7723a91e3a2db3e9d30fce20a3a5443a1
-
SHA256
0f19539c1aca12bf11bb1084ea7745240b7b7690a80140c757de6ed382eb58c1
-
SHA512
27143a3d2766b4908cedab8dab6d2522d09e5238d93527b5ed34320312558ce566032afd8ffdd1de461e893cef68dc80298f7a80a34a59e7d80c75b649191fa6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-