General
-
Target
86e4d942eaadae137e4730335406fe6f40cf5ee188b1c53b06cfb1e9a8033eb3
-
Size
453KB
-
Sample
220521-ahjtpadbej
-
MD5
84c516d86bd07bbc404afc3031437e0f
-
SHA1
5a8b41de4464f031c4dd2ce6361fd84845cdef5e
-
SHA256
86e4d942eaadae137e4730335406fe6f40cf5ee188b1c53b06cfb1e9a8033eb3
-
SHA512
e36b378400f0c6d9ed42e9d2c91b486ab75941b3f98684f9398dfb608284ef4a9264286a72471a705f4751e426b5638798f05daa8295f5b4ae3c049a0945e2da
Static task
static1
Behavioral task
behavioral1
Sample
UXeLnG40fQKjVMO.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
UXeLnG40fQKjVMO.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
kelechi12
Targets
-
-
Target
UXeLnG40fQKjVMO.exe
-
Size
564KB
-
MD5
317e3a35af7cf8c2084ee8d996fa5af5
-
SHA1
cb1ef60d0971c53ddb36240886797e8a14155d7c
-
SHA256
6b6c3c4778e2ace06259417b71dee51867d17fcc1a23ac4c779fc83b08c853ec
-
SHA512
ac05e610858a855f8fccef5dc4bc2beda07cd71c7c09725c07798533c9f4280b3eaa15ae6b428e500c1c9e2d90a633903c34298216a07ab066b08652c6d6520c
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-