General
-
Target
ba9c98a7b7ae0c218b4b29579b6cef0d.exe
-
Size
1.1MB
-
Sample
210721-wlj5dqnw4e
-
MD5
ba9c98a7b7ae0c218b4b29579b6cef0d
-
SHA1
eb485b41a99ca4b38183f130b9a180bcab2f3477
-
SHA256
b9cc4e51b1539a1e0222c25d78b79329cbcfc16c92f552f1a9627eef8738f439
-
SHA512
63aea87f171082a2763a1edbba8a33513b563295fa8f7e8ee75863fc8c12161d13118d6af99f5dd55b36ffab3321ab0d04270bcafad0e39e307f21f3f86ad8f2
Static task
static1
Behavioral task
behavioral1
Sample
ba9c98a7b7ae0c218b4b29579b6cef0d.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
ba9c98a7b7ae0c218b4b29579b6cef0d.exe
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Neways@123
Targets
-
-
Target
ba9c98a7b7ae0c218b4b29579b6cef0d.exe
-
Size
1.1MB
-
MD5
ba9c98a7b7ae0c218b4b29579b6cef0d
-
SHA1
eb485b41a99ca4b38183f130b9a180bcab2f3477
-
SHA256
b9cc4e51b1539a1e0222c25d78b79329cbcfc16c92f552f1a9627eef8738f439
-
SHA512
63aea87f171082a2763a1edbba8a33513b563295fa8f7e8ee75863fc8c12161d13118d6af99f5dd55b36ffab3321ab0d04270bcafad0e39e307f21f3f86ad8f2
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Suspicious use of SetThreadContext
-