General
-
Target
b1247f59b35e73d7375c09a78f71f94a2437edd9d5229bb0d89bc065d10345e8
-
Size
490KB
-
Sample
220521-n2kf8ahfcj
-
MD5
047225e60e9cd323866fdc0b21728ed8
-
SHA1
993a9cf04cd330b09adbb9a5b57bbd175101ca2f
-
SHA256
b1247f59b35e73d7375c09a78f71f94a2437edd9d5229bb0d89bc065d10345e8
-
SHA512
40ce10c24a6ddd7c49b36940fcbcf420c4e10b6adf72340c5fe7f648d57441bed5161f6dd3f6610e60a33b12a497a2567fa6daec5a8eebca6356cec437faa562
Static task
static1
Behavioral task
behavioral1
Sample
Qualification details.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Qualification details.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.1and1.com - Port:
587 - Username:
[email protected] - Password:
$Hari@prasad%2020
Extracted
Protocol: smtp- Host:
smtp.1and1.com - Port:
587 - Username:
[email protected] - Password:
$Hari@prasad%2020
Targets
-
-
Target
Qualification details.exe
-
Size
582KB
-
MD5
5c7d36f450111107aff25b1d090062c2
-
SHA1
752870a941f6145c37a49992dbf1a6decfd2292f
-
SHA256
5a2965c63c2c74a0e8d06008ead3a82354dfd319468074823d5224a63e1a5c52
-
SHA512
2d8968fb0380755929c08794b963e8c3aed8729121ca95db6c4c5b34c74e3ec8407a3bb31ac7d49b2a8b0367f7b0994f14d59da52b0912458a8699cf7984825c
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
suricata: ET MALWARE AgentTesla Exfil Via SMTP
suricata: ET MALWARE AgentTesla Exfil Via SMTP
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-