General
-
Target
7e7883f19c5b2dbf9eb6d817e1e624e00e2989bf221d8524dd43ced86e1faa82
-
Size
250KB
-
Sample
220520-2xvy2sbbdm
-
MD5
09072d67f57f1087c0c17234401dfb25
-
SHA1
0596584d99f402403895f45e9c08060f11ff6344
-
SHA256
7e7883f19c5b2dbf9eb6d817e1e624e00e2989bf221d8524dd43ced86e1faa82
-
SHA512
f4ce9c5da064ea4350a45b3824a31616b310ae8a04201939c7b33e9a187cb5d085f5854090c3ff6a54c8dddd8d4ab741ec253c0c2acbe2cd30ff90de8050fbcb
Static task
static1
Behavioral task
behavioral1
Sample
PO INOXIA-2020082.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PO INOXIA-2020082.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
ALIbaba123
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
ALIbaba123
Targets
-
-
Target
PO INOXIA-2020082.exe
-
Size
424KB
-
MD5
3fb4cb29f6380861a446414eb3896dd7
-
SHA1
eadbaa5085257c286e87c734a7ff14972e8fecd8
-
SHA256
9018fc4955a89ca4996540770fb9d7ed349810b9e4f6724ade1be9c6288015ed
-
SHA512
397373793eaeaf47e970e5b2b64b9b49ce27b8e4022a4dc7ffd7f65f9869d023f6b8050d8917e21b9dd6cdef553a1aafa6b68f7983ccba181690f5d045abcd21
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-