General
-
Target
New Purchase Order.exe
-
Size
545KB
-
Sample
211022-hnmrjabca4
-
MD5
62f42bfe28f4c5667bda900cfd49121f
-
SHA1
a41be8345afa9b6fcde1b68ae5062030e7f98607
-
SHA256
a9b2035fdaf72654181c96552e6b93325bc994db347d8b41757066d34a235779
-
SHA512
34c12bd7f25481f57e9fa98223c68f6548c8fdfb2f006a1c8ef5f07cf5acde4cf6628b42c1fec552ca3efe662ce2475bc60ef294970780d27884e00897304816
Static task
static1
Behavioral task
behavioral1
Sample
New Purchase Order.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
New Purchase Order.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
Ablegod123456
Targets
-
-
Target
New Purchase Order.exe
-
Size
545KB
-
MD5
62f42bfe28f4c5667bda900cfd49121f
-
SHA1
a41be8345afa9b6fcde1b68ae5062030e7f98607
-
SHA256
a9b2035fdaf72654181c96552e6b93325bc994db347d8b41757066d34a235779
-
SHA512
34c12bd7f25481f57e9fa98223c68f6548c8fdfb2f006a1c8ef5f07cf5acde4cf6628b42c1fec552ca3efe662ce2475bc60ef294970780d27884e00897304816
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-