General
-
Target
d07003cbc330579112e9ed1bffc1905b.exe
-
Size
641KB
-
Sample
210727-zb5sxw6x9x
-
MD5
d07003cbc330579112e9ed1bffc1905b
-
SHA1
fb68a99eeb0f33366398b2dbc499a0e74b64d584
-
SHA256
76938d4e2c8778bce2177462dd2875d041e69e43036c0b8e3c2f8b6e650232dd
-
SHA512
dfa6414a6d48dd0ecff853cb730301f21c99efb9b77746f4da4f755e5f326f755f97a5a3652399e2dc3aa739b62444974a7be7079a544fe9eb5c8b9babaeb649
Static task
static1
Behavioral task
behavioral1
Sample
d07003cbc330579112e9ed1bffc1905b.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
d07003cbc330579112e9ed1bffc1905b.exe
Resource
win10v20210408
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.spamora.net - Port:
587 - Username:
account@jiqdyi.com - Password:
Emotion22
Targets
-
-
Target
d07003cbc330579112e9ed1bffc1905b.exe
-
Size
641KB
-
MD5
d07003cbc330579112e9ed1bffc1905b
-
SHA1
fb68a99eeb0f33366398b2dbc499a0e74b64d584
-
SHA256
76938d4e2c8778bce2177462dd2875d041e69e43036c0b8e3c2f8b6e650232dd
-
SHA512
dfa6414a6d48dd0ecff853cb730301f21c99efb9b77746f4da4f755e5f326f755f97a5a3652399e2dc3aa739b62444974a7be7079a544fe9eb5c8b9babaeb649
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-