General
-
Target
86bc67a351569a0c4dd03a8c37030e6926cb2175e6a70c734c1409429636a035
-
Size
730KB
-
Sample
220520-2r8b7afhd7
-
MD5
52ded7c4f206bc95ac803100ae3db2d9
-
SHA1
705ba1cb3cf06a0409c89f80d9c09a54ff679aec
-
SHA256
86bc67a351569a0c4dd03a8c37030e6926cb2175e6a70c734c1409429636a035
-
SHA512
1f9f17edb8c943440feccedbd74ff5fa70b28817b3680d05606686c835843dca48ef3611ec7182a3cbc350726be2b64a3a82a4430f6cbd103a6f9cf15098a2ac
Static task
static1
Behavioral task
behavioral1
Sample
86bc67a351569a0c4dd03a8c37030e6926cb2175e6a70c734c1409429636a035.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
86bc67a351569a0c4dd03a8c37030e6926cb2175e6a70c734c1409429636a035.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.spamora.net - Port:
587 - Username:
[email protected] - Password:
Emotion1!
Targets
-
-
Target
86bc67a351569a0c4dd03a8c37030e6926cb2175e6a70c734c1409429636a035
-
Size
730KB
-
MD5
52ded7c4f206bc95ac803100ae3db2d9
-
SHA1
705ba1cb3cf06a0409c89f80d9c09a54ff679aec
-
SHA256
86bc67a351569a0c4dd03a8c37030e6926cb2175e6a70c734c1409429636a035
-
SHA512
1f9f17edb8c943440feccedbd74ff5fa70b28817b3680d05606686c835843dca48ef3611ec7182a3cbc350726be2b64a3a82a4430f6cbd103a6f9cf15098a2ac
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-