General
-
Target
a36483b99b75cb092bcda8aef6a93794886a3d3ed63a6cdb43bd6a45f5758424
-
Size
619KB
-
Sample
220521-aay9eahhe9
-
MD5
cfaf375547bd4ebf735a9688057706d5
-
SHA1
8a716e155b139a2b9d15c2e5b9742cf84334b0a8
-
SHA256
a36483b99b75cb092bcda8aef6a93794886a3d3ed63a6cdb43bd6a45f5758424
-
SHA512
c136c2e5d4dea784509364a0423863a81b78cf4cde4204c43205ed2f36a9ce2b3e6c9fd7672cae1a0ea94f4c0017877f14c2045dde51acd9c51a888b3b63f3f0
Static task
static1
Behavioral task
behavioral1
Sample
Original Shipping Documents.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Original Shipping Documents.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
chikaaka1
Targets
-
-
Target
Original Shipping Documents.exe
-
Size
787KB
-
MD5
24d470040d22bbff52a8388c96ede9c4
-
SHA1
a58d9c3007c2316676f0ca1c43eb1da94a8d0aff
-
SHA256
d1acb47d2f3d3f08def6a48de5ee5cd09cae41a8c0ad42553e83c3c36a98bba0
-
SHA512
d1aacfc74db02e9c382766287531b00846c8c5c965f156a3df711ddfd94bd00c17ff5f315aad959f4ff04c98fc91d31f482d5be10eaf5ca1099433c5af86f860
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-