General
-
Target
dfef8918a51aeb30d39bcfcc0853d1a07c6bbb9bb5c638a2a56fb5f80d49ebcf
-
Size
1.2MB
-
Sample
220520-17j4vshhfp
-
MD5
e2af684cfc5dac89aa5dc3785c4c90e1
-
SHA1
d9f46004b6e895538adb0f8810b84199eb51fcd0
-
SHA256
dfef8918a51aeb30d39bcfcc0853d1a07c6bbb9bb5c638a2a56fb5f80d49ebcf
-
SHA512
bef589f4da232d79eda2107b23ca72819a3e91154d3f80b8af36d234507b098ec123964d5e51bc3561cae4831f0c3d3b676043be84b5d98d2eb9cddb657ec42d
Static task
static1
Behavioral task
behavioral1
Sample
EYQ4WEDL.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
EYQ4WEDL.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Conversation2
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Conversation2
Targets
-
-
Target
EYQ4WEDL.EXE
-
Size
726KB
-
MD5
b1bf1c95ede331c2110cd65c2141459d
-
SHA1
230d1d34a497d8549ce3476b1b55ccb5209e3a97
-
SHA256
a475329b976a2d74fd8a96c33582ff3604dc0cb657a581935ceda83150803834
-
SHA512
efba63a0c561bbb01ad0abfc6f252bcc8d4cccfe7c2c172e96573d3239dcd17b78c24e2ef87ff74d2b3b5cb6c36dc052fa52df5381781fe80c0ad31a10bc1b50
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-