General
-
Target
Receipt..exe
-
Size
889KB
-
Sample
210721-vxhk1xqxse
-
MD5
6393d967302f542e074c717e44aa0650
-
SHA1
9d414bbf84e7c8d670f16e58cfeafa15a539b2bd
-
SHA256
a2f08d29bb884b329c3d0379d8c700622a913cefb97608ffee6e5dfd4513ede1
-
SHA512
2f524745837b0c0827f1565adbf75ced090bc249e6fb8e5a2626601470535909aca5d95d700c822df0f2ba21dbda9c7476920c459bee6f5803f5670090bb021b
Static task
static1
Behavioral task
behavioral1
Sample
Receipt..exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Receipt..exe
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ombakparadise.com - Port:
587 - Username:
[email protected] - Password:
eng!@#paradise
Targets
-
-
Target
Receipt..exe
-
Size
889KB
-
MD5
6393d967302f542e074c717e44aa0650
-
SHA1
9d414bbf84e7c8d670f16e58cfeafa15a539b2bd
-
SHA256
a2f08d29bb884b329c3d0379d8c700622a913cefb97608ffee6e5dfd4513ede1
-
SHA512
2f524745837b0c0827f1565adbf75ced090bc249e6fb8e5a2626601470535909aca5d95d700c822df0f2ba21dbda9c7476920c459bee6f5803f5670090bb021b
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-