General
-
Target
986efb76b3f07c81294445c6845cb2606a8defff65166ce9967753b43484a01a
-
Size
854KB
-
Sample
220414-pry3asbha9
-
MD5
f3a67d95d42e4418dd640758b5302ce5
-
SHA1
29910d022b481416b95f3bd1437f332290956dff
-
SHA256
986efb76b3f07c81294445c6845cb2606a8defff65166ce9967753b43484a01a
-
SHA512
dcf03e5599c29c0f62fc72cfd9870bcc0c5d32cd1adfa280a86dc11fd2f3e35b44a13506f34b415ced1bb74b5f723ee0714bae4d43740e6102b58ad4b72ce581
Static task
static1
Behavioral task
behavioral1
Sample
986efb76b3f07c81294445c6845cb2606a8defff65166ce9967753b43484a01a.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
986efb76b3f07c81294445c6845cb2606a8defff65166ce9967753b43484a01a.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Prince11
Targets
-
-
Target
986efb76b3f07c81294445c6845cb2606a8defff65166ce9967753b43484a01a
-
Size
854KB
-
MD5
f3a67d95d42e4418dd640758b5302ce5
-
SHA1
29910d022b481416b95f3bd1437f332290956dff
-
SHA256
986efb76b3f07c81294445c6845cb2606a8defff65166ce9967753b43484a01a
-
SHA512
dcf03e5599c29c0f62fc72cfd9870bcc0c5d32cd1adfa280a86dc11fd2f3e35b44a13506f34b415ced1bb74b5f723ee0714bae4d43740e6102b58ad4b72ce581
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-