General
-
Target
0c60e37e458624586822d07b93216d0a
-
Size
907KB
-
Sample
220302-yhjqpahgak
-
MD5
0c60e37e458624586822d07b93216d0a
-
SHA1
118135c261e99ed4a986d3889d29d28d485080a9
-
SHA256
16994c0ae13b33ca8f14d2e4d2c24c080bbda207bf2046818003beb0a735a9a7
-
SHA512
3f38f22137c94bff735a8cb5c6e766f0ef06b4a70b77b6767b33055622bd7a03f4842668ffdd9e8fc09e50efb192c94db9399c15e36a6b5a57c2f30f19856e3c
Static task
static1
Behavioral task
behavioral1
Sample
0c60e37e458624586822d07b93216d0a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0c60e37e458624586822d07b93216d0a.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
agenttesla
https://agusanplantation.com/v/v/inc/9c523a9e14cc09.php
Targets
-
-
Target
0c60e37e458624586822d07b93216d0a
-
Size
907KB
-
MD5
0c60e37e458624586822d07b93216d0a
-
SHA1
118135c261e99ed4a986d3889d29d28d485080a9
-
SHA256
16994c0ae13b33ca8f14d2e4d2c24c080bbda207bf2046818003beb0a735a9a7
-
SHA512
3f38f22137c94bff735a8cb5c6e766f0ef06b4a70b77b6767b33055622bd7a03f4842668ffdd9e8fc09e50efb192c94db9399c15e36a6b5a57c2f30f19856e3c
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-