General
-
Target
7f2474421180de6695e8abb4f1441092da2d91f58454921030676894fac0cdd1
-
Size
637KB
-
Sample
220520-2edxtafbg2
-
MD5
c669e933abbd128bd58ae7abaf7da87e
-
SHA1
f5b52d832090576022c4e0290f1d850dae1038e1
-
SHA256
7f2474421180de6695e8abb4f1441092da2d91f58454921030676894fac0cdd1
-
SHA512
8c128a69b153f3f443f280486132678d59eee350c8148086d19ef7977bbc00f769972b080b0fdded0baf9b05b08ddd2f15588cd335b73d1f6ee2ccc18f44c357
Static task
static1
Behavioral task
behavioral1
Sample
fxft_20200824121746.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
fxft_20200824121746.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gascuenca.es - Port:
587 - Username:
[email protected] - Password:
gasW203@Z7
Targets
-
-
Target
fxft_20200824121746.exe
-
Size
669KB
-
MD5
08585a9fbcbe30d570416066f64084c6
-
SHA1
062dff07be8d5c697a6bb6019269ae268556a2a9
-
SHA256
e7a2025af0fd110ad2777947b6c77a3a0a6325ca6634374e589f220b073f70b0
-
SHA512
8a613c284ab1ed7e16998162e246d6449272a0de46ceb30a421b65b5c640a5aa90ede773471206176a12caa84e5683f6d817ec58b70e9a4384c70638fa8c80da
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-