General
-
Target
19161d96675e90554ba94823ab9433c03c1ffa97488bcb5e7907a533fbc2e9e4
-
Size
757KB
-
Sample
220414-pxm7zsghgm
-
MD5
14429d4087074c4ed1cc267249c78024
-
SHA1
734637a5aa19ce2f5bd03b0dd29df677e6a3d046
-
SHA256
19161d96675e90554ba94823ab9433c03c1ffa97488bcb5e7907a533fbc2e9e4
-
SHA512
a1f15e4ecb5a9e858f8dd9b4b1f8f759dfa3289bd901b47af985b7d2d118f178d78cf8e46457b2bb5a0b7edfee50101e006a3e479549664a231f9357affd77bf
Static task
static1
Behavioral task
behavioral1
Sample
19161d96675e90554ba94823ab9433c03c1ffa97488bcb5e7907a533fbc2e9e4.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
19161d96675e90554ba94823ab9433c03c1ffa97488bcb5e7907a533fbc2e9e4.exe
Resource
win10v2004-20220310-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.narmadacolours.com - Port:
587 - Username:
[email protected] - Password:
Igbobuigbo231101
Targets
-
-
Target
19161d96675e90554ba94823ab9433c03c1ffa97488bcb5e7907a533fbc2e9e4
-
Size
757KB
-
MD5
14429d4087074c4ed1cc267249c78024
-
SHA1
734637a5aa19ce2f5bd03b0dd29df677e6a3d046
-
SHA256
19161d96675e90554ba94823ab9433c03c1ffa97488bcb5e7907a533fbc2e9e4
-
SHA512
a1f15e4ecb5a9e858f8dd9b4b1f8f759dfa3289bd901b47af985b7d2d118f178d78cf8e46457b2bb5a0b7edfee50101e006a3e479549664a231f9357affd77bf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
AgentTesla Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-