General
-
Target
7b118871268e39b7ecbd4d3d018312505929f9f04ccb60b20df7853e296ca782
-
Size
584KB
-
Sample
220520-2xypyagbf9
-
MD5
8101dff5eb92b1e07d543e56397758a9
-
SHA1
2cf7ead4b5fac54d8a8815f0cd65b09ab05df440
-
SHA256
7b118871268e39b7ecbd4d3d018312505929f9f04ccb60b20df7853e296ca782
-
SHA512
adceb726ca4f5b064d0ec9f30fa28c87ef5589077ae43170274d19dab266f5847744c1dc9e1173b89a094d5ada91763dee3670355dd96199436dbd1b639ee715
Static task
static1
Behavioral task
behavioral1
Sample
ADM Food new vendor060820.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ADM Food new vendor060820.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
darkeyedarkeye12
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
darkeyedarkeye12
Targets
-
-
Target
ADM Food new vendor060820.exe
-
Size
523KB
-
MD5
77fd4db1824265bd920f08ad0d0ab903
-
SHA1
bf552f3b10ce7b58050b376a195881264032a1aa
-
SHA256
6a51d3f7fc1e69bb2610e2fd5457439d305fd25d3374db6ca38040d858c11ee9
-
SHA512
53833087408dbb4251a1c667f2b5ec83778ac2113e85cff3cc6a93828a137bd1bc3dc791cea5857c52be5cf4366c8df9f807d4549d76e62583f4461b97817952
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-