General
-
Target
ebf649139f5bd13eeeb62fd9c6dcae4a28c218388067938718fc7eb75d021426
-
Size
487KB
-
Sample
220520-2vd8hsbadp
-
MD5
263f50c0b35f1d8436539e6b569a499e
-
SHA1
467e115e3c6d7fa664552798f30a3636e9283d83
-
SHA256
ebf649139f5bd13eeeb62fd9c6dcae4a28c218388067938718fc7eb75d021426
-
SHA512
dfff1e4d7f54c6e613fdb6c7b89dad713420d37a6d09a122bce1713e64b5b9479272a36e266154a4c2ae131096c2b71f07894698cae4e3634c40dc451005547f
Static task
static1
Behavioral task
behavioral1
Sample
Packing List.pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Packing List.pdf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
kingmoney12345
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
kingmoney12345
Targets
-
-
Target
Packing List.pdf.exe
-
Size
715KB
-
MD5
aaf4e659d4938d1173348105650d7755
-
SHA1
1b47c37120b880ddc95ef650a7ebc04673db41e1
-
SHA256
d99680b269d345d0e78e80b5310077f35e781ab5e74a1f926cb0be47d185a9c4
-
SHA512
6f9ada9632c2ab5c3e2cd97e11099a67b05e2c5050917e3df0aa913c179c817d39029838c8e47ce234eb1e592217c4674edc1f8ad1534b40b75d8ca91b4008a7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-