General
-
Target
1c4fd4c1adfb8b5cc412128415251379.exe
-
Size
629KB
-
Sample
210917-ytv8vsgdf6
-
MD5
1c4fd4c1adfb8b5cc412128415251379
-
SHA1
be4c136a0ff2793622d5a899bb52c184c87d7f6c
-
SHA256
4bbb3743225efc4821fed4984d9d41c3fbae8e405bd800b96016e2665bf30c9a
-
SHA512
df15a64b3002d3151370824a181dd8129c2452c1523b3ffdf1e0bbb95ae07aa0d09ed43e515a690c8040899e09a39c2ccf59d3af0199ae4f3734b863ce976316
Static task
static1
Behavioral task
behavioral1
Sample
1c4fd4c1adfb8b5cc412128415251379.exe
Resource
win7-en-20210916
Behavioral task
behavioral2
Sample
1c4fd4c1adfb8b5cc412128415251379.exe
Resource
win10-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.medicare-equipment.com - Port:
587 - Username:
[email protected] - Password:
AllTheBest777
Targets
-
-
Target
1c4fd4c1adfb8b5cc412128415251379.exe
-
Size
629KB
-
MD5
1c4fd4c1adfb8b5cc412128415251379
-
SHA1
be4c136a0ff2793622d5a899bb52c184c87d7f6c
-
SHA256
4bbb3743225efc4821fed4984d9d41c3fbae8e405bd800b96016e2665bf30c9a
-
SHA512
df15a64b3002d3151370824a181dd8129c2452c1523b3ffdf1e0bbb95ae07aa0d09ed43e515a690c8040899e09a39c2ccf59d3af0199ae4f3734b863ce976316
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Suspicious use of SetThreadContext
-