General
-
Target
8.exe
-
Size
426KB
-
Sample
211021-qxqhsabcbj
-
MD5
6e076b569560bf2e25726d56639bbbfe
-
SHA1
73babceee474d401f5f0c36bf71cbb1da7374e7b
-
SHA256
1f641c813dbf32c33e6e6a2b5f50851b967070b9e84cd288f818c6282c8671b2
-
SHA512
0dba29e66219785a9565fc0ef88ec8172f372060a6fa374498aee093e74b4495161ab8f68861004661456457042a11f4d2951db8e28e44bae9f060fe7abf579f
Static task
static1
Behavioral task
behavioral1
Sample
8.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
8.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.daproviaggi.it - Port:
587 - Username:
[email protected] - Password:
vacanz.E43
Targets
-
-
Target
8.exe
-
Size
426KB
-
MD5
6e076b569560bf2e25726d56639bbbfe
-
SHA1
73babceee474d401f5f0c36bf71cbb1da7374e7b
-
SHA256
1f641c813dbf32c33e6e6a2b5f50851b967070b9e84cd288f818c6282c8671b2
-
SHA512
0dba29e66219785a9565fc0ef88ec8172f372060a6fa374498aee093e74b4495161ab8f68861004661456457042a11f4d2951db8e28e44bae9f060fe7abf579f
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-