General
-
Target
b9772819d22abab31d2fe20b7cfb9af85fe992cb358601e321f6466d93536bb6
-
Size
420KB
-
Sample
220520-3xpmpsceen
-
MD5
2ce6d0592d99d4bcceb919866278e6f8
-
SHA1
0290646757c278c1fae0664f1e5ac369da5e7b64
-
SHA256
b9772819d22abab31d2fe20b7cfb9af85fe992cb358601e321f6466d93536bb6
-
SHA512
183463f228e0e65021acd56ac39e18fe50227425148417e39d138e6117d468f592ada4c50709f6dd3d0b10649ffe406ad4e4822b15b3751fafafa2f02d3e7d24
Static task
static1
Behavioral task
behavioral1
Sample
MV BAO HONG 8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
MV BAO HONG 8.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.foodanddesign-lb.com - Port:
587 - Username:
[email protected] - Password:
yarze@2018
Extracted
Protocol: smtp- Host:
mail.foodanddesign-lb.com - Port:
587 - Username:
[email protected] - Password:
yarze@2018
Targets
-
-
Target
MV BAO HONG 8.exe
-
Size
721KB
-
MD5
bfd2145018ef78abe6735ae1e4cddaf3
-
SHA1
ff555d3a1968a706add19a6fbb1012011923a4b0
-
SHA256
fd108b640511e040ff81be0ea54bb8bdfdb12aff54def52ac147c3fa112a143e
-
SHA512
31ba2aa7fe23fe4a5435f521d4258976bdfd45eb4462bee7bd7ee2b0ad9889e9eaf67696bfe93124e19f703574c1e5030b27b11d0cb7593c077257ee0de34740
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-