General
-
Target
fb48c5969a99555d9a72ba1427fb5959ea696cb6ba7857b42671d555141b3959
-
Size
546KB
-
Sample
220520-3htccaghf8
-
MD5
5bf584fecd24c42f858e4411fc329652
-
SHA1
c5d014c14bb47ae233514edf051c6fc794165276
-
SHA256
fb48c5969a99555d9a72ba1427fb5959ea696cb6ba7857b42671d555141b3959
-
SHA512
6a3476e5bdf867e2578d09381e67000e2e0a15be79035986bd2916af12d9d25bf23629420236a243dec5a918a1eb88fec2840bdbd32ee70c6b11156cd1ecca6a
Static task
static1
Behavioral task
behavioral1
Sample
Quote 1-2#.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Quote 1-2#.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.volivesolutions.com - Port:
587 - Username:
[email protected] - Password:
6@[B*n30b7SH
Targets
-
-
Target
Quote 1-2#.exe
-
Size
707KB
-
MD5
75a63e23c47d23198061e6b11d317f39
-
SHA1
e0282c323f307e8588f3d5e5a6f56c766ada725b
-
SHA256
32c2766ee799eeffcfdff37dc5a1237b1c152f36b7108c4bd13c082db2d46423
-
SHA512
9db43a6ce916b171ba891f4e76f102279769a0120a75803059f3e8e098e9b9fab0a712f6a171a9a310eb17e560471e32014c26693edaf4dfefcde9d69f3f7230
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-