General
-
Target
a81b6946f231ea574e2f32b85f29c7e3601f196c74f45b2bf2e565c0542b159b
-
Size
375KB
-
Sample
220520-317bxscgaq
-
MD5
9df8b94c748dcef5f2a71039a4b05cef
-
SHA1
c323bd079762cdb1d039134ed2b1b47aa45d9d69
-
SHA256
a81b6946f231ea574e2f32b85f29c7e3601f196c74f45b2bf2e565c0542b159b
-
SHA512
9124a04989fd1f8f3e1a670d4c56b1488a745d0eb1abc770ef970bdac701b0942b05754d0d77c5ee8e043617793eef7e301e41480954f62c32e647de5ec0c706
Static task
static1
Behavioral task
behavioral1
Sample
PO 345678..exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PO 345678..exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
hreny123
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
hreny123
Targets
-
-
Target
PO 345678..exe
-
Size
563KB
-
MD5
e7fece3a8cb0c783aa9cb9002e2d1f98
-
SHA1
8ac2a47dbc2eb4604b018484566a58d9c8847af6
-
SHA256
d2b2c311da183d92a228d5bf6f5e108c6b01af4c2cd890a9aa71f6ad2353cc1c
-
SHA512
1ef914de7c3309d7c7583c75b59ce20e82eeae4a05e6aacd05d774990105eab39047de9da43f22a3b3789e0c261f566369fb1da4a1eafa4fa6f42ecda91159ee
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-