General
-
Target
0ec2ceee372761b8ea8d21d37d8bd859b8ffaaf0faec999dda54e5bfb2dfe046.exe
-
Size
274KB
-
Sample
211020-aa38csgdg8
-
MD5
78d10b686503f8b21b0fa517e17fa39e
-
SHA1
3b2f329b207365d4d1eb69a75bb9a43ae5bf3c12
-
SHA256
0ec2ceee372761b8ea8d21d37d8bd859b8ffaaf0faec999dda54e5bfb2dfe046
-
SHA512
d3924caee3cb5e962703f019edd2c14dfc82360e882c67af38181bbdabadd53843cc41507f13eee64d9ddcff729f466531efcfa80f39922fc8c731a4b6a10737
Static task
static1
Behavioral task
behavioral1
Sample
0ec2ceee372761b8ea8d21d37d8bd859b8ffaaf0faec999dda54e5bfb2dfe046.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
0ec2ceee372761b8ea8d21d37d8bd859b8ffaaf0faec999dda54e5bfb2dfe046.exe
Resource
win10-en-20210920
Malware Config
Extracted
lokibot
http://iykl.xyz/Spartan3/w2/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
agenttesla
Protocol: smtp- Host:
mail.suissajoiers.com - Port:
587 - Username:
[email protected] - Password:
suissajoiers.
Targets
-
-
Target
0ec2ceee372761b8ea8d21d37d8bd859b8ffaaf0faec999dda54e5bfb2dfe046.exe
-
Size
274KB
-
MD5
78d10b686503f8b21b0fa517e17fa39e
-
SHA1
3b2f329b207365d4d1eb69a75bb9a43ae5bf3c12
-
SHA256
0ec2ceee372761b8ea8d21d37d8bd859b8ffaaf0faec999dda54e5bfb2dfe046
-
SHA512
d3924caee3cb5e962703f019edd2c14dfc82360e882c67af38181bbdabadd53843cc41507f13eee64d9ddcff729f466531efcfa80f39922fc8c731a4b6a10737
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-