General
-
Target
3b3a509fada9d3a1222d0d0f95e1f3b2f107ba2078c95dcede6173d8b21c52cb
-
Size
409KB
-
Sample
220521-n9krysaafp
-
MD5
18d3c56f0f8db27ab2c076f11c79bd49
-
SHA1
4cfa64e5dd4c8236e0f2f89d76edf66a63cf77a9
-
SHA256
3b3a509fada9d3a1222d0d0f95e1f3b2f107ba2078c95dcede6173d8b21c52cb
-
SHA512
5648d8ae2cf2e1304575dc5fd225f77340a7e062f7dd23c0bf696469b8a2b9f98033fe041331ff884250d3dc66f35dea18465a491263e246fbc0c250e6f2abe0
Static task
static1
Behavioral task
behavioral1
Sample
Payment Copy.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Payment Copy.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
petersonhouston@yandex.com - Password:
faith12AB
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
petersonhouston@yandex.com - Password:
faith12AB
Targets
-
-
Target
Payment Copy.exe
-
Size
449KB
-
MD5
6be41600e1ac87f09c86fbf87a00a31d
-
SHA1
1d1bac713ef177bb77e87a5f424fb4bf82eb778e
-
SHA256
0b43d1a92167c5579fcf6143418d0195b36be0bd7eaf8ce644d3ba344dd92936
-
SHA512
be968126085df8a67670558b22259812d7f16d70e6deff7f01405f626ccf2261cfa5992ac9f238bb60633f75eb049327bd2899948998234c8165dc54a9adf61e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-