General
-
Target
Payment slip.exe
-
Size
711KB
-
Sample
210722-9p8vrgna5s
-
MD5
974a56eac20cc277e84a6ccbfb71ee6d
-
SHA1
6029d991f11141d1ffc2353cfe7eff6c77fdb4db
-
SHA256
0f2f011ab5408672f97b1fca323554daf40b35bbfed4e587bcffea8a08ccf979
-
SHA512
ebe0b1f580e636ce21cc1677eb122a12c9afda17000b3120b49de077c27df53fd213c877c038b55ab3cc6a9b8d90457f3db3812daa8eabc98e4dedfc2e1550f3
Static task
static1
Behavioral task
behavioral1
Sample
Payment slip.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Payment slip.exe
Resource
win10v20210408
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.scottbyscott.com - Port:
587 - Username:
[email protected] - Password:
ngozi8989
Targets
-
-
Target
Payment slip.exe
-
Size
711KB
-
MD5
974a56eac20cc277e84a6ccbfb71ee6d
-
SHA1
6029d991f11141d1ffc2353cfe7eff6c77fdb4db
-
SHA256
0f2f011ab5408672f97b1fca323554daf40b35bbfed4e587bcffea8a08ccf979
-
SHA512
ebe0b1f580e636ce21cc1677eb122a12c9afda17000b3120b49de077c27df53fd213c877c038b55ab3cc6a9b8d90457f3db3812daa8eabc98e4dedfc2e1550f3
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Suspicious use of SetThreadContext
-