General
-
Target
e2c966183cc63c7a0d36c9737a98b3ed161bcb20c018221fd81cdfc0ec75636a
-
Size
637KB
-
Sample
220520-2c2k4aacbm
-
MD5
ab4ec561992d137fc4c3223374b19e1f
-
SHA1
81bd95f924221e2e461c1586446218f7e99a2a2a
-
SHA256
e2c966183cc63c7a0d36c9737a98b3ed161bcb20c018221fd81cdfc0ec75636a
-
SHA512
39d0c4bb9476a38297dcf47456ba7e49feffd3dfa3e0271e78e6fa03bb4f243f3e402b5a3da646d12cbe3ad315ab9895bcd9087ce65ccd47593e0bb215f3121b
Static task
static1
Behavioral task
behavioral1
Sample
e2c966183cc63c7a0d36c9737a98b3ed161bcb20c018221fd81cdfc0ec75636a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e2c966183cc63c7a0d36c9737a98b3ed161bcb20c018221fd81cdfc0ec75636a.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.titanworkinharders.com - Port:
587 - Username:
[email protected] - Password:
=56XtUT(r0yF
Targets
-
-
Target
e2c966183cc63c7a0d36c9737a98b3ed161bcb20c018221fd81cdfc0ec75636a
-
Size
637KB
-
MD5
ab4ec561992d137fc4c3223374b19e1f
-
SHA1
81bd95f924221e2e461c1586446218f7e99a2a2a
-
SHA256
e2c966183cc63c7a0d36c9737a98b3ed161bcb20c018221fd81cdfc0ec75636a
-
SHA512
39d0c4bb9476a38297dcf47456ba7e49feffd3dfa3e0271e78e6fa03bb4f243f3e402b5a3da646d12cbe3ad315ab9895bcd9087ce65ccd47593e0bb215f3121b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-