General
-
Target
4149ed81619e6fbe482cc898f5d5796a4bbb50cc2e7c0f4abe02e87d0cc0c77d
-
Size
1.2MB
-
Sample
211018-gjqryseabq
-
MD5
081964c37b284b77cd71ce356461d1a4
-
SHA1
117aaf0d5581a1fa05182af43866f07eb33f20fe
-
SHA256
4149ed81619e6fbe482cc898f5d5796a4bbb50cc2e7c0f4abe02e87d0cc0c77d
-
SHA512
82f689339759f9e7b34c268350871729a8e8d3480e91085e24e2807cf8739318f3ab3054594dab2993e93bdd56eaa6f3e6c4358d24e71666eff3662c01ba7465
Static task
static1
Behavioral task
behavioral1
Sample
4149ed81619e6fbe482cc898f5d5796a4bbb50cc2e7c0f4abe02e87d0cc0c77d.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.saienergy.com - Port:
587 - Username:
[email protected] - Password:
Sunrising@67
Targets
-
-
Target
4149ed81619e6fbe482cc898f5d5796a4bbb50cc2e7c0f4abe02e87d0cc0c77d
-
Size
1.2MB
-
MD5
081964c37b284b77cd71ce356461d1a4
-
SHA1
117aaf0d5581a1fa05182af43866f07eb33f20fe
-
SHA256
4149ed81619e6fbe482cc898f5d5796a4bbb50cc2e7c0f4abe02e87d0cc0c77d
-
SHA512
82f689339759f9e7b34c268350871729a8e8d3480e91085e24e2807cf8739318f3ab3054594dab2993e93bdd56eaa6f3e6c4358d24e71666eff3662c01ba7465
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-