General
-
Target
e70576f1cfe270260ea3d0a953c93aa043760f71cecfe754bc75922d64952590
-
Size
350KB
-
Sample
220520-2rgjgaahcj
-
MD5
c40e9f94a4622e16e7aeddd23b66c2dd
-
SHA1
745b85832d44ce2907b794421819b74ac1e38147
-
SHA256
e70576f1cfe270260ea3d0a953c93aa043760f71cecfe754bc75922d64952590
-
SHA512
b86c997de724c753354d9d058559c5b737dad67ce20182335962f56980fc352fbc647a2d0fe660fac33db8321666191dcff98f09b0ec7683c062a3d975d0d99d
Static task
static1
Behavioral task
behavioral1
Sample
Order_01172305_pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Order_01172305_pdf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.parshavayealborz.com - Port:
587 - Username:
[email protected] - Password:
P@rshava123456
Targets
-
-
Target
Order_01172305_pdf.exe
-
Size
389KB
-
MD5
4747f3b3a3564b5ea5c5ae0458e8cbdd
-
SHA1
6fe111382094e485c5f4c94cee08326073326c9c
-
SHA256
6fee5f036747f42839ee7df45c9f6480c9a5e7f3eddd546638f26858b2dc2276
-
SHA512
99b7f8798c787a268f9b7e5facab12e4ac75bc0f60e38dde76a38338888340ad697d1e1fc7e8576364f026bfbdef27330b9324d079c7e3560b6443c123dabb1b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-