General
-
Target
76e4ccf083ffcb4ffb42f9cb962aa86325076bf92c21b967a915e825b4d55a56
-
Size
490KB
-
Sample
220521-ne2rzsggar
-
MD5
6c317f742f79fa026d8ab065dff8d63c
-
SHA1
8cb44ddc7e8bd47b73fb00c6b24566978530fc1e
-
SHA256
76e4ccf083ffcb4ffb42f9cb962aa86325076bf92c21b967a915e825b4d55a56
-
SHA512
e3a5b687be60858b73774874968154ad136ded2a84827a6f589c46878d208b9f20c0baf09a3ba5b64b2a90aa0575f2b103476402422473ebaf8328067ef239bd
Static task
static1
Behavioral task
behavioral1
Sample
BCHILE-86712-K41-FPA-000018__REL 0017 BECHTEL.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
BCHILE-86712-K41-FPA-000018__REL 0017 BECHTEL.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
amblessed22
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
amblessed22
Targets
-
-
Target
BCHILE-86712-K41-FPA-000018__REL 0017 BECHTEL.exe
-
Size
700KB
-
MD5
70412bb185c9232855032d5ea681f5d2
-
SHA1
55f0e244005e965fbd0c9355ea4f4f51c824b8d3
-
SHA256
e51adcf99928f26014b6993369a60a9d4371759f23ddbd4d0df10105ce6de848
-
SHA512
ab20f06c0aaa1c57fea7b69e28f39a01739feb37e97639ceed29a7a573284081ad582bb5946239e592758c6fc8098e3b52a31e2bb3f4a1387196ca17513d6d81
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-