General
-
Target
ade494362402a793b745a3a7857ff5c779dfef4e931e8e05078f6b8a97c71284
-
Size
325KB
-
Sample
220520-3z38wahgg6
-
MD5
3385856849ba0ad5f5561b4039a995cc
-
SHA1
4dac1f5d3c490be0f09e0b8d98512957759d41b0
-
SHA256
ade494362402a793b745a3a7857ff5c779dfef4e931e8e05078f6b8a97c71284
-
SHA512
a16e9b0b8d2f24793d7e1d42bd5d6ea84a400ab890f85d5b20d2591dc0e03da5e3b90ee45d53c6696d3bc967b17dc9781367df2abe89ae645a2fcfaafdf7278f
Static task
static1
Behavioral task
behavioral1
Sample
QJIAYB93BC939XO.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
QJIAYB93BC939XO.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.amazinghotel.com.vn - Port:
587 - Username:
[email protected] - Password:
Amz@2020
Targets
-
-
Target
QJIAYB93BC939XO.exe
-
Size
710KB
-
MD5
391d98e696ef46d06a60903a91cae10e
-
SHA1
de4a73636eae9f3f9b1c0a3a380d5c8a432e7a3d
-
SHA256
f6a1e6d11e0366c52fea294e6010a96df682e42df3a9d4fc417ae755366e91e2
-
SHA512
154eea185216314e7c07c27f972628271a6de5d6a44935cd81d17c81bf8fff9a36eee7ae9eebbb4abb730a8e53b80b1b0e4d03cb349ade64ed360626dc372142
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-