General
-
Target
6414bff486228a3bd9f80c7c16f23665e1106aa269ded2a406414ddee14b304c
-
Size
462KB
-
Sample
220521-aqa7hsafb4
-
MD5
7bf5c37bb28dd70d33156bda1c6ab676
-
SHA1
086b21285a53d9bca348a7c9ef648ffbe25cca2a
-
SHA256
6414bff486228a3bd9f80c7c16f23665e1106aa269ded2a406414ddee14b304c
-
SHA512
60127761de7649f26d82e6b737764ba66c81e02808c86e744f4f4aaf37a7eaae8c262df031d5a57b74ee1fc3b5aa73129f5522ed38190def11a6b318f7c42149
Static task
static1
Behavioral task
behavioral1
Sample
PaymentConfirmation.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PaymentConfirmation.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Hunter$#@145722
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Hunter$#@145722
Targets
-
-
Target
PaymentConfirmation.exe
-
Size
574KB
-
MD5
2904c3bfa736172932918ccbf91f2d98
-
SHA1
45331f756bebcd7725963855be38ec8b3611ccd5
-
SHA256
496b64b591fd2d02597c9f5a4e8570f6a169ae268de8ce463ee00c890a4ad112
-
SHA512
de2989ba1bd641679d4cbe2683e893bce496841576a5f6313cf689d0c3f69263dc0ed89c76db66a985109b35d33c2dc07d40328a5a63bda3f1563a934356cb33
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-