General
-
Target
7HCYDW.zip
-
Size
383KB
-
Sample
211019-lnbwtagddm
-
MD5
523ef0163b02f619e269971c81b2bcba
-
SHA1
6ab5ee3428e369cb423f4804381e5ff71c4fee61
-
SHA256
d60b973ccf00336efa9393865752eb2e5024bc136b40879bf2786e3935ac49f1
-
SHA512
6d30041fb676ec1b3b3c57b9e5f60921b9eaca768099f05ffe3c354c3c6d6f317fc2c189e728a4d14884fdd6acc70c5ac5888af74bcc09ab0da55fd8d6b3155d
Static task
static1
Behavioral task
behavioral1
Sample
7HCYDW.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
7HCYDW.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.alraedsecurity.com - Port:
587 - Username:
[email protected] - Password:
Alraed99pass@
Targets
-
-
Target
7HCYDW.exe
-
Size
439KB
-
MD5
df149dd69ac46dbfafd8194e3d10a6ab
-
SHA1
f15fae56c94c46576e7b656ea34d5eb42bd8fda4
-
SHA256
8715b90fdea709f60563d5cfad92a81de645f3241e25804e6b58e891a11e6192
-
SHA512
861f099e004e61391f51d2f2266f3d05130db1a817838a2e5e26ba586274593cafa751b88b7a549236131fd8dfaad67ff27ba071334e9202ebb3e3196db75ef8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-