Static task
static1
Behavioral task
behavioral1
Sample
NEW APPSUILT2.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
NEW APPSUILT2.exe
Resource
win10-en-20211104
windows10_x64
0 signatures
0 seconds
General
-
Target
swift copy.zip
-
Size
96KB
-
MD5
d9193adf6b598cffce8b8c7261f2bdbc
-
SHA1
2f0b94a8cb7e9ba62ce8ff6b4257eab70b4b593e
-
SHA256
8061734fd0c8bfb3edf02e6026115b0bf55ba719a3f389abad4e81c4598d168e
-
SHA512
c8f6d6ba8ee9e2ce029bdc04c9da5698e83d07ee1de191797a6ff43874cfa1426ea802de1c6424c8162c8689ff739f198165961bdbd2bca729f618437eba7649
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.hybridgroupco.com - Port:
587 - Username:
[email protected] - Password:
Money123@@@
Signatures
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/NEW APPSUILT2.exe family_agenttesla -
Agenttesla family
Files
-
swift copy.zip.zip
-
NEW APPSUILT2.exe.exe windows x86