General
-
Target
e62199fbffc6be5401420d0c2076ecaf092e8aca42356b79482e6887d3c7060e
-
Size
531KB
-
Sample
220520-1682laegd2
-
MD5
bd56c509ca6cb2062652ffb0c80e37f5
-
SHA1
8d2836be8cdc87f6d587a3acad71a51c9dc2ab83
-
SHA256
e62199fbffc6be5401420d0c2076ecaf092e8aca42356b79482e6887d3c7060e
-
SHA512
886025b53a48f3c5ff083c003c2c0735405aa05f5b07e3ae8aac5bdacbc643eb7e012f271b14fb9cab27883cc53263dd557800b6189278122286e28d2147c44f
Static task
static1
Behavioral task
behavioral1
Sample
4959696069969605pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4959696069969605pdf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
chukwudi123
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
chukwudi123
Targets
-
-
Target
4959696069969605pdf.exe
-
Size
565KB
-
MD5
3f6bc3fd4ea20b8bc31396374ab1829f
-
SHA1
35fdfb9d4d1647efcf699a7e1e96e5cc754cc23b
-
SHA256
d29da0500ff7aecab3d24397cb745554f399dce5ab59f4ed7a95f6f959b62584
-
SHA512
5539e38f6ee9ed9c450cc6538d99201940007a4bd0c1f16fc0e4f49c64d0407d49d19690eb0f1beba157af01d46a131aa7a5f75fb763bf6c21c38c962d945db9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-