General
-
Target
a187ff3ecbbf22cc98cf591c23c7a76d.exe
-
Size
1.2MB
-
Sample
211018-y16yyaeeh9
-
MD5
a187ff3ecbbf22cc98cf591c23c7a76d
-
SHA1
9c162ac34e013979c1b643a9b92178d041d84dd0
-
SHA256
335352170d17688824cb6e8759bc39cb1b56dccd8ca0dd5e6fb48e9722c32eb4
-
SHA512
19943efa802d1ae7af7f2c30c314f02f632ec729303ce7adb1f33293e96965178e8c21feacf5afd768aa34d556b39010c529f31f6d9c0144ad78ef81c5264dc6
Static task
static1
Behavioral task
behavioral1
Sample
a187ff3ecbbf22cc98cf591c23c7a76d.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
a187ff3ecbbf22cc98cf591c23c7a76d.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.saienergy.com - Port:
587 - Username:
[email protected] - Password:
Sunrising@67
Targets
-
-
Target
a187ff3ecbbf22cc98cf591c23c7a76d.exe
-
Size
1.2MB
-
MD5
a187ff3ecbbf22cc98cf591c23c7a76d
-
SHA1
9c162ac34e013979c1b643a9b92178d041d84dd0
-
SHA256
335352170d17688824cb6e8759bc39cb1b56dccd8ca0dd5e6fb48e9722c32eb4
-
SHA512
19943efa802d1ae7af7f2c30c314f02f632ec729303ce7adb1f33293e96965178e8c21feacf5afd768aa34d556b39010c529f31f6d9c0144ad78ef81c5264dc6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-