General
-
Target
4AyNBr3uasL1KdM.exe
-
Size
395KB
-
Sample
211018-qmtsfsefap
-
MD5
8009c4fb49af5159865a87a097f916dc
-
SHA1
6009bca1181a026363ee23822fb2933b0fd8380f
-
SHA256
82f9c09823864e90054131095deec5a93914bdb3ea5c11a4bc1ee05d7e0fed72
-
SHA512
cbaef711d92a90184347ec403f687d48eb25a211183d113961c299c8db2a01b4e5a65dda02ba7f75b32005c046f2eea5407e9cddea77b892fd81065f32de8a4f
Static task
static1
Behavioral task
behavioral1
Sample
4AyNBr3uasL1KdM.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
4AyNBr3uasL1KdM.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.lahaciendamontericogrande.com.pe - Port:
587 - Username:
[email protected] - Password:
e$$
Targets
-
-
Target
4AyNBr3uasL1KdM.exe
-
Size
395KB
-
MD5
8009c4fb49af5159865a87a097f916dc
-
SHA1
6009bca1181a026363ee23822fb2933b0fd8380f
-
SHA256
82f9c09823864e90054131095deec5a93914bdb3ea5c11a4bc1ee05d7e0fed72
-
SHA512
cbaef711d92a90184347ec403f687d48eb25a211183d113961c299c8db2a01b4e5a65dda02ba7f75b32005c046f2eea5407e9cddea77b892fd81065f32de8a4f
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-