General
-
Target
e3230b34d72dbbc97197074c09a243bedb50dbb3ae4f782955fcbcc906d16ced
-
Size
776KB
-
Sample
220520-17ejdahhen
-
MD5
14fc7fda32542175f8a67d8093bfa7f2
-
SHA1
9b1fc207bc39d2f0e1508ad339c1df18313cede9
-
SHA256
e3230b34d72dbbc97197074c09a243bedb50dbb3ae4f782955fcbcc906d16ced
-
SHA512
6599d0a313e2d171f7ebb041188c9a0f73a12e5a9929407008ffd6a791bbf0509486e3d2d4c8e0287fe4e949eb9bf3969e5edc50ee2ebcb1002b046a33db699b
Static task
static1
Behavioral task
behavioral1
Sample
NEW QUOTATION.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
NEW QUOTATION.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.radianthospitals.org - Port:
587 - Username:
[email protected] - Password:
ifeanyi12345678
Extracted
Protocol: smtp- Host:
mail.radianthospitals.org - Port:
587 - Username:
[email protected] - Password:
ifeanyi12345678
Targets
-
-
Target
NEW QUOTATION.exe
-
Size
716KB
-
MD5
8486b442e01e212629e8f01807438142
-
SHA1
b155e20f80a33615a29fd6cc34d4bfc339cc35bd
-
SHA256
3d10095b28765e35766f353b3b16723f94211b3d28d2712c73d50cb7bf6a3a76
-
SHA512
bd6586abb5fd5c74c07611d03faf2894db4e4c4d5cc3a62a8e79005f2cacd35f962beb660ecb470bb7baed79300369333a1e5bdf183f3bab809b3e4fd0ed5823
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-