General
-
Target
VIFON PO.exe
-
Size
557KB
-
Sample
211022-qg8dnaceen
-
MD5
8a3847f7d153e1ac19d9a530abc2b6e3
-
SHA1
98962852fa6b0102fd15a3599550576b62fc2ddf
-
SHA256
1444e0357cb44d15a7037fa38f19977f5e1d12b6eb516aa2af67efd44b9b9a9c
-
SHA512
11d15bfb4a2acb3c7a4e5e6c996bbac0987278ebd1d5a0ef735c646456123498b2530adeed511c6dfa155bbe3601af676e445c3ceea8a7ded0a797e31361dfae
Static task
static1
Behavioral task
behavioral1
Sample
VIFON PO.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
VIFON PO.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
zxcvbnm12345
Targets
-
-
Target
VIFON PO.exe
-
Size
557KB
-
MD5
8a3847f7d153e1ac19d9a530abc2b6e3
-
SHA1
98962852fa6b0102fd15a3599550576b62fc2ddf
-
SHA256
1444e0357cb44d15a7037fa38f19977f5e1d12b6eb516aa2af67efd44b9b9a9c
-
SHA512
11d15bfb4a2acb3c7a4e5e6c996bbac0987278ebd1d5a0ef735c646456123498b2530adeed511c6dfa155bbe3601af676e445c3ceea8a7ded0a797e31361dfae
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-