General
-
Target
requirement.exe
-
Size
782KB
-
Sample
211025-pxbtysgbe4
-
MD5
201ed41a5c1490956fe1095e954925ea
-
SHA1
f18c126572c622a203cbf22b5988a5158e064b4f
-
SHA256
4bbf27862e29cfc2d5e1f89327f4f15093ac46770e727e26dd3efcdc404e54f4
-
SHA512
308ae5451043a90ccc7ce6ba5799b3e279b517e37034870e87e45e210a32093d4f94324f36a936bd7e43a34ecc8f7b01e004727c9a0de937270d03548297d6b3
Static task
static1
Behavioral task
behavioral1
Sample
requirement.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
requirement.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.diniesturkiye.com - Port:
587 - Username:
[email protected] - Password:
Orhan2018
Targets
-
-
Target
requirement.exe
-
Size
782KB
-
MD5
201ed41a5c1490956fe1095e954925ea
-
SHA1
f18c126572c622a203cbf22b5988a5158e064b4f
-
SHA256
4bbf27862e29cfc2d5e1f89327f4f15093ac46770e727e26dd3efcdc404e54f4
-
SHA512
308ae5451043a90ccc7ce6ba5799b3e279b517e37034870e87e45e210a32093d4f94324f36a936bd7e43a34ecc8f7b01e004727c9a0de937270d03548297d6b3
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Suspicious use of SetThreadContext
-