General
-
Target
a060000826711e3815c9c54e3b2e2a2ff203bb5da692ffcc89813ef399f8886b
-
Size
573KB
-
Sample
220521-abml1ahhh2
-
MD5
4790bc05c06a58d9b5a5868438296e3a
-
SHA1
861b06bba9d837df4dad1a502d1729b45b39c15f
-
SHA256
a060000826711e3815c9c54e3b2e2a2ff203bb5da692ffcc89813ef399f8886b
-
SHA512
debae7372f5fcbabfcdcb864c9bb0cdf3986a1e03f2d1e916cde12f9491bf8a1fc1f4c171e39691f684695ee959db24d8b9354e42370c09a7525eab42aee199b
Static task
static1
Behavioral task
behavioral1
Sample
Item_list_RFQ#7292020_PDF.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Item_list_RFQ#7292020_PDF.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
blessing2020
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
blessing2020
Targets
-
-
Target
Item_list_RFQ#7292020_PDF.exe
-
Size
754KB
-
MD5
57891ee94b88b26cd0c764e93893c2a0
-
SHA1
342020d38ff8e233fa31ac06dbf6f8ee393d3bb4
-
SHA256
0b85e80e717ed9a5901bcaed1db1f0bca254efb93c024670046bf5abc669d833
-
SHA512
e1acdf42a0adb5f9d1a7a28895ec652e8cf5f43d8cae47cc3dda45c570c2248eb282b610c7d349ac9428b075d59c6a631b6e4b5013954fabbc22c1ad6d7606f5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-