General
-
Target
8eebab330cd854bb3f426712bef9c2516abac5eb9ccab2f94139c0cd0dca6097
-
Size
664KB
-
Sample
220520-2scxnsahgk
-
MD5
563666da5f4e5596040e6c5ba17912f3
-
SHA1
25090acc20c128e555e9b8922031fb4c02e00057
-
SHA256
8eebab330cd854bb3f426712bef9c2516abac5eb9ccab2f94139c0cd0dca6097
-
SHA512
95fd8c64acb431d8837f8e7122f8412eca11fa2b6047c74d70d3c224733e4b5dc6b465de7acb3d94f79734f139faacc5407cf124269543ec39286a109899b0e7
Static task
static1
Behavioral task
behavioral1
Sample
8eebab330cd854bb3f426712bef9c2516abac5eb9ccab2f94139c0cd0dca6097.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8eebab330cd854bb3f426712bef9c2516abac5eb9ccab2f94139c0cd0dca6097.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
frostdell.uk - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Targets
-
-
Target
8eebab330cd854bb3f426712bef9c2516abac5eb9ccab2f94139c0cd0dca6097
-
Size
664KB
-
MD5
563666da5f4e5596040e6c5ba17912f3
-
SHA1
25090acc20c128e555e9b8922031fb4c02e00057
-
SHA256
8eebab330cd854bb3f426712bef9c2516abac5eb9ccab2f94139c0cd0dca6097
-
SHA512
95fd8c64acb431d8837f8e7122f8412eca11fa2b6047c74d70d3c224733e4b5dc6b465de7acb3d94f79734f139faacc5407cf124269543ec39286a109899b0e7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-