General
-
Target
QUOTATION 22072021.exe
-
Size
742KB
-
Sample
210722-5mf432qz9a
-
MD5
506887f557d9399e9cd663b65b2271d5
-
SHA1
4ff9f4cc2408073bf91b87a92ba6f6d74efcead0
-
SHA256
1ba742a8035002362e46828bcb7a24342bed430d6bcd59999afd520dba3de81e
-
SHA512
bb87d67afb0b9263f2802a5ca3d8b36c6e5a0005d7f5fec632e189db4f4337408d9b8994ed9ac2482efe379ef07ee0cf0ffbbadf4f17aba3ff951a09f8d67204
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION 22072021.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
QUOTATION 22072021.exe
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.totalkitchensandbathrooms.com.au - Port:
587 - Username:
[email protected] - Password:
Zs^I;kEMItH)
Targets
-
-
Target
QUOTATION 22072021.exe
-
Size
742KB
-
MD5
506887f557d9399e9cd663b65b2271d5
-
SHA1
4ff9f4cc2408073bf91b87a92ba6f6d74efcead0
-
SHA256
1ba742a8035002362e46828bcb7a24342bed430d6bcd59999afd520dba3de81e
-
SHA512
bb87d67afb0b9263f2802a5ca3d8b36c6e5a0005d7f5fec632e189db4f4337408d9b8994ed9ac2482efe379ef07ee0cf0ffbbadf4f17aba3ff951a09f8d67204
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-