General
-
Target
b0bbb1927b4b215ec8d45e9881c28caaaa733818bbbd3b3a351a87fe92f7a681
-
Size
1.6MB
-
Sample
220221-mkwmgsfdcr
-
MD5
34812e59eba05ca03bcee66ffc2ea4b6
-
SHA1
00344acdb0e1d571c150e9a76931199eb280dd02
-
SHA256
b0bbb1927b4b215ec8d45e9881c28caaaa733818bbbd3b3a351a87fe92f7a681
-
SHA512
5d326be7346bf15debef466e6ba2f2fb3e8723286dd297f1c0622c315fa57c8571814a06da16bdc35d0a6e1379905135848d9f4fcbc257ace42958392836dd4e
Static task
static1
Behavioral task
behavioral1
Sample
B6LNCKjOGt5EmFQ.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
B6LNCKjOGt5EmFQ.exe
Resource
win10v2004-en-20220112
Malware Config
Targets
-
-
Target
B6LNCKjOGt5EmFQ.exe
-
Size
1.8MB
-
MD5
80d255a6a5ec339e15d6fec3c0fef666
-
SHA1
bca665ff5a6a7084df2d424c0ed7fff3e141acbc
-
SHA256
3e48d983e3315501931c646f896a8189637f5b9d21c453b051cd17f2584ee3c4
-
SHA512
1bf61d60fc6646ff63786da850b4118fb15dcc6f2c831a8a80d58225cf55bfef395d69473afeae9d05f97c3adcedd90100c4266bc1d537b7f6d7f933cb6291c4
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Matiex Main Payload
-
AgentTesla Payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-