General
-
Target
SecuriteInfo.com.Virus.Win32.Save.a.26073.7406
-
Size
548KB
-
Sample
211022-gzxkfacagn
-
MD5
5f1a5b9f4fda1483f9409035d19a270f
-
SHA1
3fa2c9986bb4b99853126ab5591cc6d35ad3489a
-
SHA256
141f6635e9a73f078448f505b92eeb333ce841e4ce781995b75844e448ece1a6
-
SHA512
dd05faa74447536a598023886a3d3923ffe548f2543cc391a3781e8bfb798e0f4700d537d10fcfe1c3cd5b0424b4c4a5f65a2631011d2cd8d5356386f320b70f
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Virus.Win32.Save.a.26073.7406.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Virus.Win32.Save.a.26073.7406.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dairysystems.co.ke - Port:
587 - Username:
[email protected] - Password:
2019@systems
Targets
-
-
Target
SecuriteInfo.com.Virus.Win32.Save.a.26073.7406
-
Size
548KB
-
MD5
5f1a5b9f4fda1483f9409035d19a270f
-
SHA1
3fa2c9986bb4b99853126ab5591cc6d35ad3489a
-
SHA256
141f6635e9a73f078448f505b92eeb333ce841e4ce781995b75844e448ece1a6
-
SHA512
dd05faa74447536a598023886a3d3923ffe548f2543cc391a3781e8bfb798e0f4700d537d10fcfe1c3cd5b0424b4c4a5f65a2631011d2cd8d5356386f320b70f
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-