General
-
Target
JMIRLlEMHBPEEQvrxjqCV.exe
-
Size
215KB
-
Sample
210721-h7rzym8s8a
-
MD5
fd759dd1bc9fd7410275b3241e033056
-
SHA1
1b54a28e2733bb327613d9b28faf52bd03cecefe
-
SHA256
0ea5f38a33714a857aa46a7dd180fd85fea2e0eb1e919671d13b2fb5cae5296e
-
SHA512
cea6f4ec2f522d3ff09b87d04aa007bed81270eb99be443e35d32a52b00f781a57594e0b9a9cb1bd3721156e3acf9c7ba9c9f3113e55aaca1997c2bbd9e41221
Static task
static1
Behavioral task
behavioral1
Sample
JMIRLlEMHBPEEQvrxjqCV.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
JMIRLlEMHBPEEQvrxjqCV.exe
Resource
win10v20210408
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
SkoipkqHg0
Targets
-
-
Target
JMIRLlEMHBPEEQvrxjqCV.exe
-
Size
215KB
-
MD5
fd759dd1bc9fd7410275b3241e033056
-
SHA1
1b54a28e2733bb327613d9b28faf52bd03cecefe
-
SHA256
0ea5f38a33714a857aa46a7dd180fd85fea2e0eb1e919671d13b2fb5cae5296e
-
SHA512
cea6f4ec2f522d3ff09b87d04aa007bed81270eb99be443e35d32a52b00f781a57594e0b9a9cb1bd3721156e3acf9c7ba9c9f3113e55aaca1997c2bbd9e41221
Score7/10-
Adds Run key to start application
-