General
-
Target
a92cbe4d3eb6c53fa84fa11b974d306710ec71dde4e630deae5cde8b3bd30b7f
-
Size
504KB
-
Sample
220520-2bh3csabdq
-
MD5
4b052c74adc466d010fa6f108cd89abe
-
SHA1
a5bfbcc8cd8da0b5de3ba4ee63797686456ce6e9
-
SHA256
a92cbe4d3eb6c53fa84fa11b974d306710ec71dde4e630deae5cde8b3bd30b7f
-
SHA512
96f611ffba995b61280afc5fe232745c87eb11560837b0eafb35767afaf6b989f6440549518162c5ea8c0987a8149654f45fbaea448cfaad714c17aa6bb3c9b9
Static task
static1
Behavioral task
behavioral1
Sample
reciept.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
reciept.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.rezuit.pro - Port:
587 - Username:
[email protected] - Password:
grace1234
Targets
-
-
Target
reciept.exe
-
Size
538KB
-
MD5
fb6650cb0204aeaf9f01581fa777170d
-
SHA1
0c29c9c8058028e60354e37aa77a57479231da9e
-
SHA256
edb51d595de89116b04ffcf488ee84943d47cbbc0803dc81aac6752600cd7528
-
SHA512
68657534237c3d00c217925b1ad125cd5216395a435e2cf44eec684514bcbb2674592a733d50fc60377cc420f60e52b9db4778383b05e5106ad02a3c7b438cbd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-