General
-
Target
0751800875e7c5a0dcc2463d2864a1391785edb3da6b1e990435bf8c4c396d81
-
Size
753KB
-
Sample
220414-px14vacbe2
-
MD5
cc508061b7e46c2d3c5152bac6abe356
-
SHA1
e6fa2e72beac848a49d0425b300c98ca94f99131
-
SHA256
0751800875e7c5a0dcc2463d2864a1391785edb3da6b1e990435bf8c4c396d81
-
SHA512
b5daaddb2e4cc883c878b9b0d57c9c133ef80b882ea0bbc5fba0adb257f270c8faa3d752899bddf7c91c683ffa16c077a8eef127598a08401983f15338591298
Static task
static1
Behavioral task
behavioral1
Sample
0751800875e7c5a0dcc2463d2864a1391785edb3da6b1e990435bf8c4c396d81.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
0751800875e7c5a0dcc2463d2864a1391785edb3da6b1e990435bf8c4c396d81.exe
Resource
win10v2004-20220331-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
chibuikelightwork1
Targets
-
-
Target
0751800875e7c5a0dcc2463d2864a1391785edb3da6b1e990435bf8c4c396d81
-
Size
753KB
-
MD5
cc508061b7e46c2d3c5152bac6abe356
-
SHA1
e6fa2e72beac848a49d0425b300c98ca94f99131
-
SHA256
0751800875e7c5a0dcc2463d2864a1391785edb3da6b1e990435bf8c4c396d81
-
SHA512
b5daaddb2e4cc883c878b9b0d57c9c133ef80b882ea0bbc5fba0adb257f270c8faa3d752899bddf7c91c683ffa16c077a8eef127598a08401983f15338591298
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
AgentTesla Payload
-
Suspicious use of SetThreadContext
-