General
-
Target
b19105ecc517cbb106099a15ed4ace6204ef48706d1a004191a2eeaaeabeae58
-
Size
462KB
-
Sample
220520-3eed1sbfgj
-
MD5
aac3cec322421aa8c7f038d7114c8195
-
SHA1
26526d3b151be69806731446d81cd9f921207cac
-
SHA256
b19105ecc517cbb106099a15ed4ace6204ef48706d1a004191a2eeaaeabeae58
-
SHA512
805fd4dfc97f1d052623aff4c8009b81d47a285db674776a738288e1b5f40a4d41c98aa7a4f5d22d55277b0088e8ce8207fe9327af26ce3604a5d05ea4c153e6
Static task
static1
Behavioral task
behavioral1
Sample
orExxXbXvTnxbVr.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
orExxXbXvTnxbVr.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.albaniandailynews.com - Port:
587 - Username:
[email protected] - Password:
125875.jUkT
Extracted
Protocol: smtp- Host:
mail.albaniandailynews.com - Port:
587 - Username:
[email protected] - Password:
125875.jUkT
Targets
-
-
Target
orExxXbXvTnxbVr.exe
-
Size
666KB
-
MD5
2596ed8a852cfbe3e4dba2e6073271f0
-
SHA1
49ef23cb43fc70d96497a957c7eaa8677e7d9367
-
SHA256
423179b859d9bb89495fa79e2bc08106627003a541b08b1679a25134060cc09d
-
SHA512
f91455a67ac1959ae755474d3c211a354940a902769a41c98ed480cba2452fdcfab89a49634149d0e6da7a5188c920f57e1f0b7002174b250834e51ca836f9e3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-