General
-
Target
373a700807ab8348c6adf26531fbd451d4416baede34538477a2461bf9da94e1
-
Size
462KB
-
Sample
220521-n9r62aaagm
-
MD5
9d31b8396c931bd73fd7b7eafafd3516
-
SHA1
1e6269d63bb703bca4b53efa566bf74cbe3d914a
-
SHA256
373a700807ab8348c6adf26531fbd451d4416baede34538477a2461bf9da94e1
-
SHA512
175b283618e4290f60c87d33aa8d72773db473da091342ddc312eda6ab525ebbdbad5dba350b5d98a0ec1392d8222549eeda43a3588bf918675f9aa84204d0d2
Static task
static1
Behavioral task
behavioral1
Sample
Revised PI-02-06-2020.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Revised PI-02-06-2020.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.shakurjay.com - Port:
587 - Username:
[email protected] - Password:
z9{6l#Bp?sUj
Targets
-
-
Target
Revised PI-02-06-2020.exe
-
Size
513KB
-
MD5
52858e0c40dc79c797c15592d6f53855
-
SHA1
cfcdcca75f40a999632cb4620d6ea16192a0e143
-
SHA256
592f7910caf9e163da420457db1b8c33d938c56d03c8e2955c990e8d3395ac39
-
SHA512
84c730872c25ca71ed316fa5b1423bdb751d84f64a49ef954d4f4af7121d6f37f202ccf3b8f5ca5f722fb2b03913ea13977ae8d146ce17baa7deae8a267b2ca2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-