General
-
Target
1876ea4e87fed1bca0296aa51195ebbd3ce8f334f6557fdc59449db6c48d1581
-
Size
279KB
-
Sample
220521-bb7gvaegap
-
MD5
e92e8779bbd65629b3ce1df74c591b12
-
SHA1
f9f56a1359a928546189c2703b45bdc8864f215d
-
SHA256
1876ea4e87fed1bca0296aa51195ebbd3ce8f334f6557fdc59449db6c48d1581
-
SHA512
41d8e11a99b1539ca02f4a2a618e0ecc026195b70b78b434b3d913ad8a2e8618d6ec9521eb55417f45ae06e629bfb7d9216dfbf87e50a00349af800f241a04db
Static task
static1
Behavioral task
behavioral1
Sample
Remitttance jpg.scr
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Remitttance jpg.scr
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Ginternational1.
Targets
-
-
Target
Remitttance jpg.scr
-
Size
324KB
-
MD5
dce5536f0ec74014e25f5253447d4e98
-
SHA1
29209f0f85dcdd71ef3453caf3b208c1a2120776
-
SHA256
d93fb27172d9296a4067808a2dcc325bbed786666cc49646dfd0684ad9a92beb
-
SHA512
1acf8e60b674ed698dba884658ed82be16156f85b39fe1b1c18598e64b527ccfd3b529b2b22185d85d50e5efab380c08749e189b4a83476c7ea8e69a62b515a5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-