General
-
Target
396982a79b9731d15ed130e4f2dbf01a14b243105bd58ad2edade78ee960042f
-
Size
479KB
-
Sample
220520-2klvlsaegj
-
MD5
182f9ded93ba725b1d4d9a3d119880b3
-
SHA1
91332329184fc5e38e90e27f48f43dfb5154345f
-
SHA256
396982a79b9731d15ed130e4f2dbf01a14b243105bd58ad2edade78ee960042f
-
SHA512
cbd8f1c784fa6219d3317c9eaa176f188bfd3138876eea334ebfb2f7934ab572eac9db7a100de0c1d60f813172528d17eb70aec2bf9d4bc1f18e9f0ab06f3551
Static task
static1
Behavioral task
behavioral1
Sample
URGENT_QUOTATION_PR #270473.xlxs.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
URGENT_QUOTATION_PR #270473.xlxs.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
mosque10
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
mosque10
Targets
-
-
Target
URGENT_QUOTATION_PR #270473.xlxs.exe
-
Size
512KB
-
MD5
65020b545758df2c5a8b9397cc40d8e0
-
SHA1
94ec19a6d4aa00951d57ff0a50100c6f3fe0791d
-
SHA256
1eab0743a0c7a257a4e914404724f5ee37ed428aed24c341edc44f7878be9a52
-
SHA512
a30fd8c66771455735449aa9cb4f67e9daebc704e0a57938bdd4017ab4b06ee7c4ad4d6f01bd97cf094624a2ca926a53f8a49d6f18eabba11e0b6a7fa5e5a271
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-