General
-
Target
1bf791e2b93a44c3d0b1838c16e2cacae338d3a4beb0e50d772ec933c5a1a172
-
Size
1.2MB
-
Sample
220414-ptr2rscaa4
-
MD5
c6ab4341c098e5c9e7e340773fbb7493
-
SHA1
e9020cc72a7fe481a7221e311cf1f3ea28ecf57f
-
SHA256
1bf791e2b93a44c3d0b1838c16e2cacae338d3a4beb0e50d772ec933c5a1a172
-
SHA512
60d3d8c2eefc558ca062b0052c8d1e63d2f83a771520b654d0e1467aee8692401427a8150b20bc220a2879513af349f9c4d38aa62d0d8bf94cc3c379b89a93b5
Static task
static1
Behavioral task
behavioral1
Sample
1bf791e2b93a44c3d0b1838c16e2cacae338d3a4beb0e50d772ec933c5a1a172.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
1bf791e2b93a44c3d0b1838c16e2cacae338d3a4beb0e50d772ec933c5a1a172.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.hyshippingcn.com - Port:
587 - Username:
[email protected] - Password:
e*u@qkS4
Targets
-
-
Target
1bf791e2b93a44c3d0b1838c16e2cacae338d3a4beb0e50d772ec933c5a1a172
-
Size
1.2MB
-
MD5
c6ab4341c098e5c9e7e340773fbb7493
-
SHA1
e9020cc72a7fe481a7221e311cf1f3ea28ecf57f
-
SHA256
1bf791e2b93a44c3d0b1838c16e2cacae338d3a4beb0e50d772ec933c5a1a172
-
SHA512
60d3d8c2eefc558ca062b0052c8d1e63d2f83a771520b654d0e1467aee8692401427a8150b20bc220a2879513af349f9c4d38aa62d0d8bf94cc3c379b89a93b5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-