General
-
Target
198a2082d2a5bf1e7042ef3c5aa5c19f75a40f52d9cc9b36432bcf08dfc80cb4
-
Size
544KB
-
Sample
220520-2mzjgsffb8
-
MD5
97acc99016459764ce8ec38e5d79844e
-
SHA1
dbd88e0f97ad21b086ae78864f4a10b46856972b
-
SHA256
198a2082d2a5bf1e7042ef3c5aa5c19f75a40f52d9cc9b36432bcf08dfc80cb4
-
SHA512
b3088c061fab2f57756b9f9e6585dd8348a25a0f1aa1e92a51d9f99ff4206646b77ff38da9c911b19046bd361af62b971e5f0f132ce75ee494994b80516819ec
Static task
static1
Behavioral task
behavioral1
Sample
ta9hOZ9yGYrrbrJ.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ta9hOZ9yGYrrbrJ.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.jaldhl.com - Port:
587 - Username:
[email protected] - Password:
LlJGJr!5
Targets
-
-
Target
ta9hOZ9yGYrrbrJ.exe
-
Size
662KB
-
MD5
f4262471f23208adc42ffbcaaf7cdb99
-
SHA1
7e858fab80da0e74ce6eeb5924841cfb8cfa41cf
-
SHA256
1ebe798364b176f491d9eb6b1b4eedf59e43d712883460f61212deafb2ddcf6c
-
SHA512
1b55467a1f64d21fcb26ef768b2f7c59070d766ef41574b2d0ae4f88d4ddfbb0d821b26ff1fa8ef126c1f24f10b3351f1a7576af619f9211ba4f270577f599cc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-