General
-
Target
SecuriteInfo.com.Trojan.YakbeexMSIL.ZZ4.1057.9472
-
Size
732KB
-
Sample
211201-kfb16sahgp
-
MD5
d47502f0f5b346169fe57cabb1228eee
-
SHA1
9ddfed11c7fd9beedc44c39ce7f1cac45783b532
-
SHA256
2d1dda31bb4e7657a3f9878a056323e398590837d3c11b45540013103bfbca97
-
SHA512
24869686cdea61de8025471bed5f5fe38ea0e5e94aec375cf52a25fc5ec28319314471576f66d5bbe66da45c252a6620cd272dc2690fbc929973a0e0b8eb284b
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.YakbeexMSIL.ZZ4.1057.9472.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.YakbeexMSIL.ZZ4.1057.9472.exe
Resource
win10-en-20211104
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dairysystems.co.ke - Port:
587 - Username:
[email protected] - Password:
2019@systems
Targets
-
-
Target
SecuriteInfo.com.Trojan.YakbeexMSIL.ZZ4.1057.9472
-
Size
732KB
-
MD5
d47502f0f5b346169fe57cabb1228eee
-
SHA1
9ddfed11c7fd9beedc44c39ce7f1cac45783b532
-
SHA256
2d1dda31bb4e7657a3f9878a056323e398590837d3c11b45540013103bfbca97
-
SHA512
24869686cdea61de8025471bed5f5fe38ea0e5e94aec375cf52a25fc5ec28319314471576f66d5bbe66da45c252a6620cd272dc2690fbc929973a0e0b8eb284b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-