General
-
Target
016d9078762cb89a6043b916f3634374
-
Size
493KB
-
Sample
211021-lq3sbaahgk
-
MD5
016d9078762cb89a6043b916f3634374
-
SHA1
439da9cb1d337363ffe9c3a362480f8c2dd4edf5
-
SHA256
2d27046c2b2fb934bedac546cc0dcea64fd788baff5eccfcf52b430df453a6ae
-
SHA512
a98052faca220bc29c374f0405a226c15b48ffac174b411b0880e5f89ee80e841e638c3e5fe15a12f5ceb03bd7b0d3543fc0dc78a0ad256bed1c343a379bba54
Static task
static1
Behavioral task
behavioral1
Sample
016d9078762cb89a6043b916f3634374.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
016d9078762cb89a6043b916f3634374.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.croatiahunt.com - Port:
587 - Username:
[email protected] - Password:
VilaVrgade852
Targets
-
-
Target
016d9078762cb89a6043b916f3634374
-
Size
493KB
-
MD5
016d9078762cb89a6043b916f3634374
-
SHA1
439da9cb1d337363ffe9c3a362480f8c2dd4edf5
-
SHA256
2d27046c2b2fb934bedac546cc0dcea64fd788baff5eccfcf52b430df453a6ae
-
SHA512
a98052faca220bc29c374f0405a226c15b48ffac174b411b0880e5f89ee80e841e638c3e5fe15a12f5ceb03bd7b0d3543fc0dc78a0ad256bed1c343a379bba54
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-