General
-
Target
Status of Payment.exe
-
Size
447KB
-
Sample
211018-cy6phadac6
-
MD5
0a319fcaff75155af14b98f3292a1b1e
-
SHA1
0a15198b36eea03b3bec2e599e8c5cc8830fc6b2
-
SHA256
405b3676366ea03fa6a3673499137339c4abe643b9d73eb027bdd7bb255788de
-
SHA512
bb823d2659a8feb5cd9bbc89cbaea6734873772c848278a8599385983307c82802bfa5e56d1310475a5d1ad4db1c1f5f27d9c93ac37f470e80f9511613e29505
Static task
static1
Behavioral task
behavioral1
Sample
Status of Payment.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Status of Payment.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Everest10
Targets
-
-
Target
Status of Payment.exe
-
Size
447KB
-
MD5
0a319fcaff75155af14b98f3292a1b1e
-
SHA1
0a15198b36eea03b3bec2e599e8c5cc8830fc6b2
-
SHA256
405b3676366ea03fa6a3673499137339c4abe643b9d73eb027bdd7bb255788de
-
SHA512
bb823d2659a8feb5cd9bbc89cbaea6734873772c848278a8599385983307c82802bfa5e56d1310475a5d1ad4db1c1f5f27d9c93ac37f470e80f9511613e29505
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-