General
-
Target
c2feeb52cfdce6ef164006f224c520a93e800ed124b9e4bb57f0257153f0639d
-
Size
408KB
-
Sample
220521-n1ejksede2
-
MD5
8d7a8a13d51b053d6e0255b75ceef9d1
-
SHA1
cb08c89a9c1926ee3c7fef1892dc035cd557826e
-
SHA256
c2feeb52cfdce6ef164006f224c520a93e800ed124b9e4bb57f0257153f0639d
-
SHA512
52dda2a1fa774c7e4a51b0462034e05f70074b9901382742ec6527cfb74eab9b18b43ebc39c3e7ac22bf885f481617452f0a8b8ced36331f445f81fe28dec13a
Static task
static1
Behavioral task
behavioral1
Sample
Payment Copy.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Payment Copy.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
petersonhouston@yandex.com - Password:
faith12AB
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
petersonhouston@yandex.com - Password:
faith12AB
Targets
-
-
Target
Payment Copy.exe
-
Size
449KB
-
MD5
2442896682f24bfd0ea5f237d45c95eb
-
SHA1
64b0c3d4093a39bfe618f6da9c7fc6f0115a48c2
-
SHA256
494f9dd6446590e875fa54a866cfc76c795f19722f2842d14d82590de96b6b68
-
SHA512
757d54fe247067a4990b131276375fb51c3a3a3bda64236924ef54278e34fde2e92f6c2c8f9b9dd6cb145405482cbadae2d47544854acccb5d6e80b80a57c87f
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-