General
-
Target
e3b43833.exe
-
Size
800KB
-
Sample
211023-kjlpsadbfm
-
MD5
c2ce115eece7c53ec5b202a0bd4d1778
-
SHA1
8cbb0836da268c35d2ad2691edaa4252134e21af
-
SHA256
e3b438339a4ce2dba793223d9448b8c597080daaaf63bdd94a79079b78cf2fcf
-
SHA512
a1c377449ce676685d30cc5f2cb3fb8c5d78d4c63986003ecc78fae5f2e8c8a77393c03c8bdd83a542a38ba204c297ffc2e9ca74f68424d2cedd71117a462e81
Static task
static1
Behavioral task
behavioral1
Sample
e3b43833.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
e3b43833.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.penavico--cz.com - Port:
587 - Username:
[email protected] - Password:
Fq$L%J((!6
Targets
-
-
Target
e3b43833.exe
-
Size
800KB
-
MD5
c2ce115eece7c53ec5b202a0bd4d1778
-
SHA1
8cbb0836da268c35d2ad2691edaa4252134e21af
-
SHA256
e3b438339a4ce2dba793223d9448b8c597080daaaf63bdd94a79079b78cf2fcf
-
SHA512
a1c377449ce676685d30cc5f2cb3fb8c5d78d4c63986003ecc78fae5f2e8c8a77393c03c8bdd83a542a38ba204c297ffc2e9ca74f68424d2cedd71117a462e81
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Nirsoft
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-