General
-
Target
SecuriteInfo.com.Variant.Cerbu.117505.10723.10196
-
Size
790KB
-
Sample
211018-1chybaehf6
-
MD5
9fd8919e62792e6d93995b5f7abda850
-
SHA1
c143d0ece3715bc4c484e201f4b9c5e7630e7fd2
-
SHA256
20e9c3ad420ffd76094590adced58f056d38e5d6afe3ee9e21e7b29ff5a80da7
-
SHA512
35bcd80094c49e5ef9399a52277b4a592cd4bd659a50ebabfbf62775d5681f1028eb29a357f4e19ab93a528f14e0632eebc8a6f2ccf9234bc2f7d76a80dd963e
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Cerbu.117505.10723.10196.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Cerbu.117505.10723.10196.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.xxltrucck.com - Port:
587 - Username:
[email protected] - Password:
vFguU*i0
Targets
-
-
Target
SecuriteInfo.com.Variant.Cerbu.117505.10723.10196
-
Size
790KB
-
MD5
9fd8919e62792e6d93995b5f7abda850
-
SHA1
c143d0ece3715bc4c484e201f4b9c5e7630e7fd2
-
SHA256
20e9c3ad420ffd76094590adced58f056d38e5d6afe3ee9e21e7b29ff5a80da7
-
SHA512
35bcd80094c49e5ef9399a52277b4a592cd4bd659a50ebabfbf62775d5681f1028eb29a357f4e19ab93a528f14e0632eebc8a6f2ccf9234bc2f7d76a80dd963e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-