General
-
Target
b192313acfccf7a8f6ad03b0f951e7eb9c071ec9ea7b0a6679965d59786b81e9
-
Size
307KB
-
Sample
220520-2aw8lafac2
-
MD5
03f300f35c6474cfa9ced3bbf226caef
-
SHA1
eed9b7af3c26e90b82e786bb72a2f0bcd6b6180a
-
SHA256
b192313acfccf7a8f6ad03b0f951e7eb9c071ec9ea7b0a6679965d59786b81e9
-
SHA512
890dbebfb0c87c0ae0060429627c90436170c4df9934e9f016d53a23c51e83e9371d19b47803cf29cdd4859680f1c34ca3864c38b5bfcbe9f2681816a3e2543d
Static task
static1
Behavioral task
behavioral1
Sample
SOA- Feb2020 to Jun2020.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SOA- Feb2020 to Jun2020.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
privateemail.com - Port:
587 - Username:
[email protected] - Password:
@damienzy.xyz2240
Targets
-
-
Target
SOA- Feb2020 to Jun2020.exe
-
Size
324KB
-
MD5
c77edf13eafc541ba8bfdfebf7e5aa9b
-
SHA1
4ceb14f6732f5f6a530623941e83ae1a49379cd6
-
SHA256
9aa09beb9797b5ae4b2f80937442a013a32e78cfa8b59838cf364a53d65f71bc
-
SHA512
ca6d3ab46bee1b43e829f0257921baf61681092644a908bab1840ce64de18a6343fce600611794dc802c448ef6365775f76a69a50050c50d2d0809762d3dcdcd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-