General
-
Target
4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd
-
Size
989KB
-
Sample
220414-ps2jtaggbn
-
MD5
20d41b23ce125d7ae86c1a1e5b9d208c
-
SHA1
99967b9cc47e145819bd5e0d58200497f07e5b0b
-
SHA256
4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd
-
SHA512
a719386808b620c157e6e80f2615ae4fe68c73a677ac9bd43b72093d339dfc16ff55efe374d8c1832718e5c8aeb2cd1c66a9d38261c218aa4d2c17c2376d8094
Static task
static1
Behavioral task
behavioral1
Sample
4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe
Resource
win10v2004-20220331-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
tinfortruck.com - Port:
587 - Username:
[email protected] - Password:
owen@123
Targets
-
-
Target
4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd
-
Size
989KB
-
MD5
20d41b23ce125d7ae86c1a1e5b9d208c
-
SHA1
99967b9cc47e145819bd5e0d58200497f07e5b0b
-
SHA256
4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd
-
SHA512
a719386808b620c157e6e80f2615ae4fe68c73a677ac9bd43b72093d339dfc16ff55efe374d8c1832718e5c8aeb2cd1c66a9d38261c218aa4d2c17c2376d8094
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-