General
-
Target
quotation 2021-12-01 pdf.exe
-
Size
528KB
-
Sample
211201-rylrnagae3
-
MD5
237a401044a7d016c172e44c2785c551
-
SHA1
8da96f7ae5a24d6a79c4e1e4698779558e7e0508
-
SHA256
b3ef58847127711be325f2386c95bb360fc27abb57aa785d02fca1621f07b020
-
SHA512
9649f1a8845760242ec8618f0c169d6959577852699261bfa38797e7a83528dfb823102baba76523b9dd2f3a76b40fb7f60aed0e28e8c9f08ddd2c6976492737
Static task
static1
Behavioral task
behavioral1
Sample
quotation 2021-12-01 pdf.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
quotation 2021-12-01 pdf.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.urrbantrading.com - Port:
587 - Username:
[email protected] - Password:
qLZNrrR0
Targets
-
-
Target
quotation 2021-12-01 pdf.exe
-
Size
528KB
-
MD5
237a401044a7d016c172e44c2785c551
-
SHA1
8da96f7ae5a24d6a79c4e1e4698779558e7e0508
-
SHA256
b3ef58847127711be325f2386c95bb360fc27abb57aa785d02fca1621f07b020
-
SHA512
9649f1a8845760242ec8618f0c169d6959577852699261bfa38797e7a83528dfb823102baba76523b9dd2f3a76b40fb7f60aed0e28e8c9f08ddd2c6976492737
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-