General
-
Target
ad7afc77905a422704608863c539783bef28acc4cebb3b22bc061ff3ed59ff3d
-
Size
385KB
-
Sample
220521-ncwg7adea6
-
MD5
586a662f90888118aaeef7fe9c7312db
-
SHA1
da7402cfc1fd8530a73b2dd9012a362c6a93e1fc
-
SHA256
ad7afc77905a422704608863c539783bef28acc4cebb3b22bc061ff3ed59ff3d
-
SHA512
49ec5c64d8c48fe07985361e7547ab778ee562892b562d990159409c5a3edd3a6486d350bd70af825f510094741fd3bd90b8a2c36ad841eedf7be22f245a3235
Static task
static1
Behavioral task
behavioral1
Sample
order 5500065035170620.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
order 5500065035170620.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.solivera.com - Port:
587 - Username:
[email protected] - Password:
.7S+{Gv&\{
Targets
-
-
Target
order 5500065035170620.exe
-
Size
426KB
-
MD5
81f65f990a84c6f185606ff67470c306
-
SHA1
e256b306db229b5f4302b470b59accdf94a5c824
-
SHA256
5cf1f9fd8a8000ae58fa7607a3201c6abfbc9a352d90e589ef1d93317336c881
-
SHA512
5c54323b514bb3fe1d2eb7e9da9ba4c1f882e9e4afdba56d4347a5c212576dff63258060a8313536950fea4d9746df652d226c148f41ba0e55bc3babe74eb1ca
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-