General
-
Target
74ea4075d54f3151e6b3fa44935d3541bcf532775d63d936a36691733886d910
-
Size
462KB
-
Sample
220521-al6smaadg6
-
MD5
6bcb22eae46997b71f3dd53474503787
-
SHA1
ec211dc08349be20f93662ce9621ec40dd020970
-
SHA256
74ea4075d54f3151e6b3fa44935d3541bcf532775d63d936a36691733886d910
-
SHA512
1796e53a04cffb0d1a7ede0b3936be15c00ea1cc4e91d471e7ade3a106989799905fb5d8b46f1add72957b08447bed94a0ff69f2114f14d3c6c2eea07cda819e
Static task
static1
Behavioral task
behavioral1
Sample
169287394-75414-SANWVDDNETP0034-3.pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
169287394-75414-SANWVDDNETP0034-3.pdf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
Good1234@@@
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
Good1234@@@
Targets
-
-
Target
169287394-75414-SANWVDDNETP0034-3.pdf.exe
-
Size
568KB
-
MD5
5d434473eb24eb71a2a6e94c4e6e3c6b
-
SHA1
64b7fe575fcd9c9a77e42e30cce2e205b2100313
-
SHA256
3b86298f7b9280b5cb9332c52a36c02386cea08e7b3cef8565bd06cbb08f44cb
-
SHA512
a9508c35aed0dd637d94c7dfd1373eb59856ce894f1388f438b94a06304c674aeb50db5613c157a62135541e5f1c41e440fffb5bf6107e86666d0c7364d9f057
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-