General
-
Target
ebd6c95a7b98b452cd49da59aa42b65503d0b493c099b2d667001faf6efbcaec
-
Size
457KB
-
Sample
220521-bmcrlsfbbn
-
MD5
52052393f1bc4f0c5abcbe8b1e33ac48
-
SHA1
86bd126c46dbc7d64c37d70362cb2f9ecbd6e91d
-
SHA256
ebd6c95a7b98b452cd49da59aa42b65503d0b493c099b2d667001faf6efbcaec
-
SHA512
1ad94a91253537bb6d928b872237c551b8af8fb2fcc83b3cbbd97a8f9ad47ce3edae04eb5e752f198ab62c9f116f7b9a2d74fb47c5b7551ed890829dbd613bce
Behavioral task
behavioral1
Sample
Scan-Copy.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Scan-Copy.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
chuk5anderson@yandex.ru - Password:
chukwudi123
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
chuk5anderson@yandex.ru - Password:
chukwudi123
Targets
-
-
Target
Scan-Copy.exe
-
Size
529KB
-
MD5
e69da1196ecfd94f4fe6a86a23aae8c0
-
SHA1
f15ecfdc801b7b957dc9697ca7643e7ebf05383f
-
SHA256
320d8e5b7e793a621dd6abf947dc9f04051e25473e1b9fe7da90cf161bf24112
-
SHA512
e796b9ff2536fe68b828a2ff14c5d8712efc99421e8db5c065e99d1cd3e9a46df8429d78c16b535bafda9c1df72505951ecce7721480647f795db1e8abdc576d
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-