General
-
Target
94bf4fcd5ae08ca59d02312f2f10b4501294a64baa78dbdca346590d54773ff4
-
Size
370KB
-
Sample
220520-2czrhafbb2
-
MD5
c4c024a17b1e01a7b13934ab1a5a4850
-
SHA1
e1c34ddb79e38ce0fd1ded238a086c5b1271ba90
-
SHA256
94bf4fcd5ae08ca59d02312f2f10b4501294a64baa78dbdca346590d54773ff4
-
SHA512
69f88109d07a33f92423ffe84ce82f65467239b8f13577d56d9dec8f0e7ce793c38e2e7af0548c6c8ce6d76aef9f6e060df0b6700ff80288daefd96c3d30e9d7
Static task
static1
Behavioral task
behavioral1
Sample
URGENT_QUOTATION_PR #270473.xlxs.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
URGENT_QUOTATION_PR #270473.xlxs.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
mosque10
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
mosque10
Targets
-
-
Target
URGENT_QUOTATION_PR #270473.xlxs.exe
-
Size
458KB
-
MD5
86fc98a0a100edc402bacbb5cdae261a
-
SHA1
c6ce415988f9066f5c9d7c75443ba05a90b4595d
-
SHA256
53c2646413f8ad24c8faf0230527a207a163df8df788b45f36afe2d55210eb2d
-
SHA512
e5acaaae2bd179b55ec16ce05963a759376776cd4ee9157af02ad570e72cd3d3dba7b4dbffd875d1f48f25c3429b7bd67be4ba938fbfa46619a5e20521a338a1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-