General
-
Target
9693a5652edf480d38ca5bcaa77507f855bcdb373779e2b00a5a05a02efbce37
-
Size
470KB
-
Sample
220521-adwyfschgp
-
MD5
3ad2f9e25957bef30a1ae38cbc174562
-
SHA1
af4644a05009adca2fc42c6ed7b936b02d6c4eb6
-
SHA256
9693a5652edf480d38ca5bcaa77507f855bcdb373779e2b00a5a05a02efbce37
-
SHA512
a98e59b4c3547afc22dbdb6ec1afe93b79e17decc042fc55024de22be8e2d2c8e0dc9efc55db70e489eafb89cd2a9af5ef096e0797ae01c7208c1e3a8916d15f
Static task
static1
Behavioral task
behavioral1
Sample
PO-9082020.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PO-9082020.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.allbayrak.com - Port:
587 - Username:
[email protected] - Password:
VuSfIUj9
Targets
-
-
Target
PO-9082020.exe
-
Size
585KB
-
MD5
4491b461f590cd8d300fa3dc7458b1c5
-
SHA1
d2542ef5b265a869f4b74747fa0c8144df13f80d
-
SHA256
fa8b28f3909cc745b84a3d2c0bbb74d6dab6f97599c3ff367ae296b767418217
-
SHA512
a53ba47f2503d6f9bbf2aa4ef6abb89732349b709e0e15277388f61cccdfcbeace87b6d7da5828dd8f19b28cc086698fce985b2c2baa27ed790db301c784a146
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-