General
-
Target
d424ebac88ac6b91b12abda0c1c548c5e74b1241040509668732b3f1d4c2b2ef
-
Size
273KB
-
Sample
220520-18e7asaaar
-
MD5
45674e014ca4d8250c3ee58212cf8adf
-
SHA1
58672d432e9e1b2ad15d1a01e379492085c24edb
-
SHA256
d424ebac88ac6b91b12abda0c1c548c5e74b1241040509668732b3f1d4c2b2ef
-
SHA512
3f296b5b26c3611f55817909a8993a04bea97cab08d19ab41dcedd606cd58ce776b5d2c6b57cf9f84fddb2e4381ba53c4b9d7bab49421f53afe5bff5d3e861c2
Static task
static1
Behavioral task
behavioral1
Sample
YdvJnnnDX0FUKjI.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
YdvJnnnDX0FUKjI.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.arhigraf.ro - Port:
587 - Username:
[email protected] - Password:
kH~2kU(;kEtR
Targets
-
-
Target
YdvJnnnDX0FUKjI.exe
-
Size
290KB
-
MD5
1795c0e7a5c67752a3e13c5a0f6ce9af
-
SHA1
509635b13636a2b0dc5308270fbabfdfa4e0a020
-
SHA256
6fae5955bfeac6e762f65fabedb2be2fdcd385347e6b9db19825096ee2ebd9a1
-
SHA512
ed7384717a3c6c63b53188b73a46c57058f4bd327c14fb11f23ae7e8c42cf7f63a7e0aef6914cc08301b4615d3f3d9d87c56037a37e4e57269e63703d53683d2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-