General
-
Target
2a325a8d5588a4a0f59bedc75142082a
-
Size
30KB
-
Sample
210722-6ktz8bzfcs
-
MD5
2a325a8d5588a4a0f59bedc75142082a
-
SHA1
d35a452b03cc3ee3a250d1c94638c371b6831af0
-
SHA256
53189c032edd0ef379751c569b7dcff388fa59a66b4e3094728a431d80ef3b3e
-
SHA512
1fa5513b6d996f80953e0c5e0c34f841f40a276186ea811a9cfc5909eb8f7e945794e9967f7b44f46af8da25cf850f6b969193d77672de8e2de9f6aa2aa5b354
Static task
static1
Behavioral task
behavioral1
Sample
2a325a8d5588a4a0f59bedc75142082a.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
2a325a8d5588a4a0f59bedc75142082a.exe
Resource
win10v20210408
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bundabergtrophies.com.au - Port:
587 - Username:
[email protected] - Password:
KzDcikPPHW
Targets
-
-
Target
2a325a8d5588a4a0f59bedc75142082a
-
Size
30KB
-
MD5
2a325a8d5588a4a0f59bedc75142082a
-
SHA1
d35a452b03cc3ee3a250d1c94638c371b6831af0
-
SHA256
53189c032edd0ef379751c569b7dcff388fa59a66b4e3094728a431d80ef3b3e
-
SHA512
1fa5513b6d996f80953e0c5e0c34f841f40a276186ea811a9cfc5909eb8f7e945794e9967f7b44f46af8da25cf850f6b969193d77672de8e2de9f6aa2aa5b354
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-