General
-
Target
616defc78cf585a29bfc973e5936da17dc90067b084f84cece48e1ad0f6544c1
-
Size
594KB
-
Sample
211201-hz3xwsafej
-
MD5
d54f059ee1f1d05fe9160cc69c026642
-
SHA1
35369476fabc0d574840fa8f2f9b6ab560f91da3
-
SHA256
616defc78cf585a29bfc973e5936da17dc90067b084f84cece48e1ad0f6544c1
-
SHA512
08b4a1816c2ae3fb5ee2b6407446ca1027f4eb22ec679b5d015c87d5cc0c1cb911b73bc31633366647ee7292a207f4c9efd129fe7525c0a7091dd0b25d93fb74
Static task
static1
Behavioral task
behavioral1
Sample
616defc78cf585a29bfc973e5936da17dc90067b084f84cece48e1ad0f6544c1.exe
Resource
win10-en-20211104
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.curvetechllc.com - Port:
587 - Username:
[email protected] - Password:
Stan78#ford75
Targets
-
-
Target
616defc78cf585a29bfc973e5936da17dc90067b084f84cece48e1ad0f6544c1
-
Size
594KB
-
MD5
d54f059ee1f1d05fe9160cc69c026642
-
SHA1
35369476fabc0d574840fa8f2f9b6ab560f91da3
-
SHA256
616defc78cf585a29bfc973e5936da17dc90067b084f84cece48e1ad0f6544c1
-
SHA512
08b4a1816c2ae3fb5ee2b6407446ca1027f4eb22ec679b5d015c87d5cc0c1cb911b73bc31633366647ee7292a207f4c9efd129fe7525c0a7091dd0b25d93fb74
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-