General
-
Target
a3a57df2e00d69ac411881f1a9a00f7795339efe2fb88b6fd3109a8e3982cd16
-
Size
661KB
-
Sample
220521-aaxqkshhe8
-
MD5
13b86df5df8465ea97f2c4c02aef592a
-
SHA1
a622833d405b0fc1ab3657879895c90c09415f65
-
SHA256
a3a57df2e00d69ac411881f1a9a00f7795339efe2fb88b6fd3109a8e3982cd16
-
SHA512
9d4718bf15edd332281bc9fd60c15b11ca5f6c51350eda592287518cb829f224a602b0714dcdf90d80afad193d9b54f09176668f8831356f93642576f39b308f
Static task
static1
Behavioral task
behavioral1
Sample
FLS 13009490.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
FLS 13009490.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.foodanddesign-lb.com - Port:
587 - Username:
[email protected] - Password:
yarze@2018
Extracted
Protocol: smtp- Host:
mail.foodanddesign-lb.com - Port:
587 - Username:
[email protected] - Password:
yarze@2018
Targets
-
-
Target
FLS 13009490.exe
-
Size
865KB
-
MD5
e0ed1b5ff8ac40dd3dc90cab9f5ebea2
-
SHA1
c549e9529df06b579e71825afb01776f040c40dc
-
SHA256
26bbae23e7af3110397e04f66aac1c280374e97ee2c90344eef114fa25d86e61
-
SHA512
b016386d409514088d9415dd5567734fd4cbba41f88adf08e4957e8b800e7c11966bf9c4ad828553e44e53280e00c42c305414cedd88288bd36ffc14054a1760
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-