General
-
Target
e21ee8516cb2fdf009d7b783cfee05118090f8642d02a5ba0587d6a2bad37ad0
-
Size
470KB
-
Sample
220520-3nclsahbg6
-
MD5
7b453b39d2005fea6946b3ce4ef02159
-
SHA1
67c346dc001f579921d6c9d63536ce3ec59cb929
-
SHA256
e21ee8516cb2fdf009d7b783cfee05118090f8642d02a5ba0587d6a2bad37ad0
-
SHA512
71ba5737963c527d1f484eacdb0a8be8a33fef6c06eac1e1b61af4ed46186da7703206c8fe1dbf5c9d1471f0918006d74ea01b181b5eaa353c91ca68539beddd
Static task
static1
Behavioral task
behavioral1
Sample
SUNCOAST-PO-02-08-2020.eml.mail.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SUNCOAST-PO-02-08-2020.eml.mail.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
qwerty123@
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
qwerty123@
Targets
-
-
Target
SUNCOAST-PO-02-08-2020.eml.mail.exe
-
Size
569KB
-
MD5
a39cec2a3be12cf29057cbea21c3a882
-
SHA1
1bf7f6b909b35e875a0baeac445de27337fa251a
-
SHA256
f6bef06e07a604f0158a5cd3db9b6dda13ec88a9253b15d8bcf16e94c68eff44
-
SHA512
99277ea47ded0f20a3a16b921b6258fc3913cb72eca193e6f022228e9ae8d8c6c8eb179f0924d5e2ced377407afae0e43f2a98f180758e8b6db20d9909023d20
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-