General
-
Target
68fd31ca16cf5441c614463658c3a8ded3bbc9c7bb9215c091512dcb467759ec
-
Size
829KB
-
Sample
220521-nfapwsggbr
-
MD5
61bca303e69c539a16cd4303ce54ea20
-
SHA1
2ca11975ee7ace5907c2c479d4a16a12188cfb6e
-
SHA256
68fd31ca16cf5441c614463658c3a8ded3bbc9c7bb9215c091512dcb467759ec
-
SHA512
0f06b71031766fe880c2d524595748c4d1bbfc238d90354e1f920b4d4bdc6bacc50b2d1bd4e839af6ec5e8836337da13982657247366ad52f330e6fa8710452e
Static task
static1
Behavioral task
behavioral1
Sample
SOA.rar (5).exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SOA.rar (5).exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.framafilms.com - Port:
587 - Username:
victortognola@framafilms.com - Password:
lister11
Targets
-
-
Target
SOA.rar (5).exe
-
Size
1.1MB
-
MD5
65bbfd84026e4fcf4c8358bc26612137
-
SHA1
4fd791bcc11ffd72d1c6008fe57fb72528616eac
-
SHA256
0e066fd73611293c37ac6e37ff0878fe3c3122078e3cb0e46c38ca151aac5162
-
SHA512
b505b64dc762f1a3fe2b657b753c8f71ed74c1ff63b6965977eb1f2c2c21ae33dcebc0125d5428c645fd6c8ca95800918deef4694f2599fc571d91b2e46bb215
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-