General
-
Target
a91eb16dec4963d0b7198e9bb1b3d379
-
Size
520KB
-
Sample
211021-snfy4abdan
-
MD5
a91eb16dec4963d0b7198e9bb1b3d379
-
SHA1
c037fe12d74cdb7bc82b338a3babd35aa11c1b57
-
SHA256
4da9cdaabab199c810cad207fe4dd792068eb0993f3a26a73c0a9bfb19f9831c
-
SHA512
09a9a53ba5b2a7ee1d1074353c1e64ff50b8dab1aa3e8fbf4baf0326e0a0e2a2306c2ce9d4546693ae58a2a5278df94d0d877bf04fc024b6091af5483447d881
Static task
static1
Behavioral task
behavioral1
Sample
a91eb16dec4963d0b7198e9bb1b3d379.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
a91eb16dec4963d0b7198e9bb1b3d379.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.scahe.co.in - Port:
587 - Username:
sj@scahe.co.in - Password:
scaheavy@12345
Targets
-
-
Target
a91eb16dec4963d0b7198e9bb1b3d379
-
Size
520KB
-
MD5
a91eb16dec4963d0b7198e9bb1b3d379
-
SHA1
c037fe12d74cdb7bc82b338a3babd35aa11c1b57
-
SHA256
4da9cdaabab199c810cad207fe4dd792068eb0993f3a26a73c0a9bfb19f9831c
-
SHA512
09a9a53ba5b2a7ee1d1074353c1e64ff50b8dab1aa3e8fbf4baf0326e0a0e2a2306c2ce9d4546693ae58a2a5278df94d0d877bf04fc024b6091af5483447d881
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-