General
-
Target
614548546d14df033e549438f2c09bb384e5c1dedd39b37d9349e1c162eb5709
-
Size
519KB
-
Sample
220520-2gpgbsadek
-
MD5
724c41ef103d584bfa5637a5e0e7f7df
-
SHA1
6853ccca29b8ff01508eea831fd2599d6496ace8
-
SHA256
614548546d14df033e549438f2c09bb384e5c1dedd39b37d9349e1c162eb5709
-
SHA512
e56bf0b73cae106293a7513196565c92b98e435382edac4e355dc3b110eb0439c806302d04c4c78ec9348b3ceaf6fb9aad8fdacf0b7b46e689dd5894a08b63d8
Static task
static1
Behavioral task
behavioral1
Sample
HBL-BL-copies.new.XML.eml.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
HBL-BL-copies.new.XML.eml.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
qwerty123@
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
qwerty123@
Targets
-
-
Target
HBL-BL-copies.new.XML.eml.exe
-
Size
572KB
-
MD5
68b47901c3484d260de8dd21ac24d230
-
SHA1
1e731dbc15ab59d173451aa770f263aa2b287e8a
-
SHA256
236c4c9b2fca74b99831acd489771a516612a233176dd3093b70ea146ec6717f
-
SHA512
e302ba856ce4f9a571fa5002d11203a5f9e46f4fd46a080716007d9a3efcdcd454e197b6981dbb7d3f6d2d8f529cbf07e8c2d80e56ce82b3d4d66931f3bcdd6a
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-