General
-
Target
PO-165306 -OMSPS2020091611D.exe
-
Size
558KB
-
Sample
211025-vlt42shcer
-
MD5
d445122f1903ad138e169cc0add2b5f4
-
SHA1
458fee4dc112f41c636a6f81ca15970711d0aaa1
-
SHA256
a12e4c0e507712a93706967e43b769ad7c23db93d70d1b184efdb97d7217bfc2
-
SHA512
89a9c9e8c82345dcdbedbc031984ab2acaf06d06c23580860c3d71796867200662c8165c891950e0efa5b4b33520f723aed2d57dc61cc03d12c76945327aae69
Static task
static1
Behavioral task
behavioral1
Sample
PO-165306 -OMSPS2020091611D.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
PO-165306 -OMSPS2020091611D.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.medicare-equipment.com - Port:
587 - Username:
[email protected] - Password:
AllTheBest777
Targets
-
-
Target
PO-165306 -OMSPS2020091611D.exe
-
Size
558KB
-
MD5
d445122f1903ad138e169cc0add2b5f4
-
SHA1
458fee4dc112f41c636a6f81ca15970711d0aaa1
-
SHA256
a12e4c0e507712a93706967e43b769ad7c23db93d70d1b184efdb97d7217bfc2
-
SHA512
89a9c9e8c82345dcdbedbc031984ab2acaf06d06c23580860c3d71796867200662c8165c891950e0efa5b4b33520f723aed2d57dc61cc03d12c76945327aae69
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-