General
-
Target
Inv_7623980.exe
-
Size
930KB
-
Sample
210721-p1z6v8tzds
-
MD5
af3a59ad59b90cdbb755d2226f07d2f2
-
SHA1
da66f2c7723a91e3a2db3e9d30fce20a3a5443a1
-
SHA256
0f19539c1aca12bf11bb1084ea7745240b7b7690a80140c757de6ed382eb58c1
-
SHA512
27143a3d2766b4908cedab8dab6d2522d09e5238d93527b5ed34320312558ce566032afd8ffdd1de461e893cef68dc80298f7a80a34a59e7d80c75b649191fa6
Static task
static1
Behavioral task
behavioral1
Sample
Inv_7623980.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Inv_7623980.exe
Resource
win10v20210408
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.shivsundaram.com - Port:
587 - Username:
[email protected] - Password:
hemant@10023
Targets
-
-
Target
Inv_7623980.exe
-
Size
930KB
-
MD5
af3a59ad59b90cdbb755d2226f07d2f2
-
SHA1
da66f2c7723a91e3a2db3e9d30fce20a3a5443a1
-
SHA256
0f19539c1aca12bf11bb1084ea7745240b7b7690a80140c757de6ed382eb58c1
-
SHA512
27143a3d2766b4908cedab8dab6d2522d09e5238d93527b5ed34320312558ce566032afd8ffdd1de461e893cef68dc80298f7a80a34a59e7d80c75b649191fa6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-