General
-
Target
vbc.exe
-
Size
816KB
-
Sample
211025-pv7tlsgbe2
-
MD5
f1119af41aa1a22ea18df0c7b51aac11
-
SHA1
22c83312287db61ecfe83256f44b99be4ac25919
-
SHA256
c37506485694a1440ecbf47a0084a3691084e0869abb163f353fe081e1c49670
-
SHA512
12324f2a6fea3f0d27e62f6f4348a3aff5740a8ca886f0f3629c1d16843909f35d8444b70ed57fd739aac5ba1c60902819f9bd0dd7443603977dba71f7857b7a
Static task
static1
Behavioral task
behavioral1
Sample
vbc.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
vbc.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.enerzi.co - Port:
587 - Username:
[email protected] - Password:
Enerzis@123!#
Targets
-
-
Target
vbc.exe
-
Size
816KB
-
MD5
f1119af41aa1a22ea18df0c7b51aac11
-
SHA1
22c83312287db61ecfe83256f44b99be4ac25919
-
SHA256
c37506485694a1440ecbf47a0084a3691084e0869abb163f353fe081e1c49670
-
SHA512
12324f2a6fea3f0d27e62f6f4348a3aff5740a8ca886f0f3629c1d16843909f35d8444b70ed57fd739aac5ba1c60902819f9bd0dd7443603977dba71f7857b7a
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-