General
-
Target
679095b25876f6f91bb1cf9d2ffe2b8133943aced1255d0f0212540fb4d58942
-
Size
645KB
-
Sample
220414-hnxazaadg7
-
MD5
6b66ea11a8f7baec2dd0c25201f5e421
-
SHA1
cafc5bfa2c455f6a2faa031cb2d6a3b46e95e9fe
-
SHA256
679095b25876f6f91bb1cf9d2ffe2b8133943aced1255d0f0212540fb4d58942
-
SHA512
d8400b15a93223a290e070c28c75fcc308ea6dc856ce2d2a64fe958eeacef2eaa27fad92efde1da97ae2184d1d2d7297e177ce928a72e27b0d030f9f44702233
Static task
static1
Behavioral task
behavioral1
Sample
679095b25876f6f91bb1cf9d2ffe2b8133943aced1255d0f0212540fb4d58942.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
679095b25876f6f91bb1cf9d2ffe2b8133943aced1255d0f0212540fb4d58942.exe
Resource
win10v2004-20220310-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
lochmann2
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
lochmann2
Targets
-
-
Target
679095b25876f6f91bb1cf9d2ffe2b8133943aced1255d0f0212540fb4d58942
-
Size
645KB
-
MD5
6b66ea11a8f7baec2dd0c25201f5e421
-
SHA1
cafc5bfa2c455f6a2faa031cb2d6a3b46e95e9fe
-
SHA256
679095b25876f6f91bb1cf9d2ffe2b8133943aced1255d0f0212540fb4d58942
-
SHA512
d8400b15a93223a290e070c28c75fcc308ea6dc856ce2d2a64fe958eeacef2eaa27fad92efde1da97ae2184d1d2d7297e177ce928a72e27b0d030f9f44702233
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-