General
-
Target
61ab5f32a1c06e09a9d46226481182614b9b93d31471fcf43b7b1e7164f1112e
-
Size
1.5MB
-
Sample
220521-mpbg4scbc8
-
MD5
442ce9b5c4eab10b690601b5ea3aa080
-
SHA1
684ed6911368bf841c66cdb2bee6723a37487fe9
-
SHA256
61ab5f32a1c06e09a9d46226481182614b9b93d31471fcf43b7b1e7164f1112e
-
SHA512
b5e0f0e6078143ee5cffcc14f165f1c1234fb0eabb32e2d2dd434cabe00757219cd85739d9580dc39d4f0c617865634d8be06a5e7f14646e9de10f03d7a6624e
Static task
static1
Behavioral task
behavioral1
Sample
crypted.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
crypted.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
elchapo
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
elchapo
Targets
-
-
Target
crypted.exe
-
Size
1.9MB
-
MD5
7c2a10dc93956da00bccf4fdffd4ba0a
-
SHA1
604bd7f3d7821ae6c0e3ee47157b297e608721fb
-
SHA256
397e1bcdab4807c8083eb263c87d2afa3b098d9aee59cb2b3ddd4a3746b8d272
-
SHA512
04a58c2f75a4ddc208f435aa189b4cf238902373b07c784da97a904e6156afe453e0fc1ad62398fcb362badd96ba2d1d2941de8849f15f67a0d674b4f8be20c8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-