General
-
Target
6908cd5efe5473c75c9f2fc4a0b71557
-
Size
736KB
-
Sample
211022-xftmfachhl
-
MD5
6908cd5efe5473c75c9f2fc4a0b71557
-
SHA1
4e9bbcaf024a89dba6b9e2df0324b6903bdfa6f0
-
SHA256
5db2f2a9d86b6af21d70f614d0d918f22febf3ec5915e05d83b1fa791e4917d6
-
SHA512
bdfa188b32876f0f1fc0fa842fc964fcadedf024f2c10964e2fc093f2994d953ca7036c70c7d484c767a8d0a278c59ababb1ea851a1021bc7eb52beae5a47487
Static task
static1
Behavioral task
behavioral1
Sample
6908cd5efe5473c75c9f2fc4a0b71557.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
6908cd5efe5473c75c9f2fc4a0b71557.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.tccinfaes.com - Port:
587 - Username:
margaridasantos@tccinfaes.com - Password:
TccBps1427log
Targets
-
-
Target
6908cd5efe5473c75c9f2fc4a0b71557
-
Size
736KB
-
MD5
6908cd5efe5473c75c9f2fc4a0b71557
-
SHA1
4e9bbcaf024a89dba6b9e2df0324b6903bdfa6f0
-
SHA256
5db2f2a9d86b6af21d70f614d0d918f22febf3ec5915e05d83b1fa791e4917d6
-
SHA512
bdfa188b32876f0f1fc0fa842fc964fcadedf024f2c10964e2fc093f2994d953ca7036c70c7d484c767a8d0a278c59ababb1ea851a1021bc7eb52beae5a47487
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-