General
-
Target
a061525b3a2bd5c33247101b2ba5cb9b7c6dcb10f2923c4315a88d080b2b4b1c
-
Size
635KB
-
Sample
220520-2b89jsfag2
-
MD5
8e6e3c1f57f107e9d56819bf99d7b70b
-
SHA1
904d5299142cc025e02f55d1b37d23c4873e487a
-
SHA256
a061525b3a2bd5c33247101b2ba5cb9b7c6dcb10f2923c4315a88d080b2b4b1c
-
SHA512
fb0cfcd8eed6e9fab660d34ad8cf95dc8ad9a0fa2ac24feb4a540613409a1edde6c443d628fce58baf19547a2a42bfb8e7e3fa05c54dd8228f8064cd64c08df4
Static task
static1
Behavioral task
behavioral1
Sample
MV. HUA SHAN.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
MV. HUA SHAN.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.vishnucars.in - Port:
587 - Username:
[email protected] - Password:
Swift123#
Extracted
Protocol: smtp- Host:
smtp.vishnucars.in - Port:
587 - Username:
[email protected] - Password:
Swift123#
Targets
-
-
Target
MV. HUA SHAN.exe
-
Size
750KB
-
MD5
01cb8bc3d29ffd8b250929e4ff86f332
-
SHA1
c0b95a3eafb986bd532f4723ffb93be60d8cf5a1
-
SHA256
d4dcc5c195854c35dd8936c0ec04ce903b60153042e5e13e03ba080fbf73519e
-
SHA512
480b8315dde715541d87d0bd1f01585471f5e19de59de062fabfcc2804a1b5bfa219c3df4ba448ebb9c9fba027059798f8a72350d31af6cc2e74972ea04206a0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-