General
-
Target
54342346655_88_876_9_276545_28765566566.exe
-
Size
382KB
-
Sample
211025-m45dqsgher
-
MD5
3cb3d290f92bebc3686144ccd2781a7b
-
SHA1
b6624d19e6173ef0ae13079dcc2da92db4cfe73e
-
SHA256
ea9baa1f1f247269768ac113a6e19f639446c6019a36665f94188a603dacaeed
-
SHA512
751903d038fb4946bf73419ee6db7c357eebe6b856422a52cd2e5ff43a703bd6bc8a6fab57b483cfc7e400df7425683488cf970668dd55a10d5705bc5a57074b
Static task
static1
Behavioral task
behavioral1
Sample
54342346655_88_876_9_276545_28765566566.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
54342346655_88_876_9_276545_28765566566.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.randebann.com - Port:
587 - Username:
[email protected] - Password:
nZ(hZCp1
Targets
-
-
Target
54342346655_88_876_9_276545_28765566566.exe
-
Size
382KB
-
MD5
3cb3d290f92bebc3686144ccd2781a7b
-
SHA1
b6624d19e6173ef0ae13079dcc2da92db4cfe73e
-
SHA256
ea9baa1f1f247269768ac113a6e19f639446c6019a36665f94188a603dacaeed
-
SHA512
751903d038fb4946bf73419ee6db7c357eebe6b856422a52cd2e5ff43a703bd6bc8a6fab57b483cfc7e400df7425683488cf970668dd55a10d5705bc5a57074b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-