General
-
Target
8813800c165300cbca741b2176dc9a7e1974670a1f79548394e07b28a5a258c8
-
Size
504KB
-
Sample
220521-ag51jadbcr
-
MD5
1ee843699b6943b199f9dcc04274116c
-
SHA1
c188895928511b6a8e685e0936a804c5836e8ff1
-
SHA256
8813800c165300cbca741b2176dc9a7e1974670a1f79548394e07b28a5a258c8
-
SHA512
3b1c74fad9f926205fa3586a69cdf05319bb6bef348127dc4a6e246cfd971d1b484c30dd6b23f038385ff175212917b3ab6278596196d46d6db3c248e924a25b
Static task
static1
Behavioral task
behavioral1
Sample
Scope of Work.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Scope of Work.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
challenge12345@
Targets
-
-
Target
Scope of Work.exe
-
Size
622KB
-
MD5
bdd57632833a23e2b123641479f678e4
-
SHA1
52b55e182189afd6a9d625ad7f6058cd196b71f0
-
SHA256
73139f2987ab1ea834185b7bd405612b31b62948333dcde7d46ec69671245881
-
SHA512
65a873881d9425896e7ecdf637b10a52755d9ac3d99871a2346d6f4ca0106bb86ba4bd1659e3ec22fb2ec920bc20a518dd1506fffaf661de3c74eed72d104f34
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-