General
-
Target
e5bcb7c01d5c17464ad2b6877cef3ae073fd79576b53e37fd2da2dcfbefbfd8c
-
Size
405KB
-
Sample
220521-cdk73adff9
-
MD5
26d96be9c70e72d5a0d0bf114ec38c89
-
SHA1
3d4ecb26a4ed84119cbcc7f0178bf4c891afe4a0
-
SHA256
e5bcb7c01d5c17464ad2b6877cef3ae073fd79576b53e37fd2da2dcfbefbfd8c
-
SHA512
2285c51709194f8dbf38c7921c3b771b154b30d6dc3e8b1dd11b41a822d8ca775d6a3e674da0f2b0360348f490e9e4573c96422ec429a306d9ba2f3394aef7af
Static task
static1
Behavioral task
behavioral1
Sample
00000056431.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
00000056431.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
08140480968Ju@
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
08140480968Ju@
Targets
-
-
Target
00000056431.exe
-
Size
462KB
-
MD5
84f834b868b0e17a6d1ce5b7ee4e04be
-
SHA1
8d4f5fe04c16574d22a6a17d3f2d751d817293dd
-
SHA256
6fb90df91c05a8ded30de9ef0a21bb41e2c4f1ee3c9ef814877feb500cf8cac6
-
SHA512
84154d9717741df46e7fb257e092e11a3250024f0b422ec3e497068c6dfd85be07ea566d04308fbd6b62c51317165185690512a938346cb43dddc39291e3e3ec
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-