General
-
Target
3d09c61aac3f737c8925e270398b067e280f2fb77267e7d6406e6e8df0196fad
-
Size
902KB
-
Sample
220520-2kgkwsfeb5
-
MD5
85728ba7fcb04367a738f48ac1a8e4a8
-
SHA1
45b346ce39e57637dbbadfd044ff7a54943a00db
-
SHA256
3d09c61aac3f737c8925e270398b067e280f2fb77267e7d6406e6e8df0196fad
-
SHA512
1899e703c3221746a1dc50e3bba4d6b036e232965b6dd0e0ae4a938725aec59e30160925128f2194c98ac1e7258c2216b13b44363ea270a230d0303da7e8f05f
Static task
static1
Behavioral task
behavioral1
Sample
hDL4BS7 Documents.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
hDL4BS7 Documents.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.totallyanonymous.com - Port:
587 - Username:
[email protected] - Password:
WNap~n5E#_rD
Targets
-
-
Target
hDL4BS7 Documents.exe
-
Size
1.1MB
-
MD5
302b98e7137292ea2007c530ef223187
-
SHA1
9c1a887cd2aa930f7217b161086b5e9954e76cf0
-
SHA256
d49937e0591260a3ac4786590742570bbdf561425889822c1ee564a2b8fff67b
-
SHA512
3c7628a0cceefeedbb6feaadbfb1579faa86de7b8a9a74fb6b08ebbac6dd80016c6e2276aa32e4aa217a83ad797cfe787d82722cb53af694699d90470d0dc619
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-