General
-
Target
89e02028cd44520ba0558e8cb063f581f0a26c6723b38e6caac188ddce01500f
-
Size
360KB
-
Sample
220521-ngxk2sghaq
-
MD5
0e6f7d3c83ee162e8349c1fbaf1a267b
-
SHA1
63f202b40b54c4c6765e8c07b09f581b8517de3d
-
SHA256
89e02028cd44520ba0558e8cb063f581f0a26c6723b38e6caac188ddce01500f
-
SHA512
3184d8192822da99624499d0c9d9fc6d933b39e888a34600e4b50f43356b56590d314e23b444a03c818def73abbb264bf6a4709641b1e2dd46e8bb0b859179c2
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER PO 18.08.20.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
NEW ORDER PO 18.08.20.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
faith12AB
Targets
-
-
Target
NEW ORDER PO 18.08.20.exe
-
Size
399KB
-
MD5
ccf52fc5bc915ee7d6b31b13afbf3213
-
SHA1
d16c079cb879ab4ebdb6fdaa0baa3dcfe45270db
-
SHA256
f749fcdcc06750ec8e3839b52ddd13e9a2023673da83aefe1c13439e1351fab5
-
SHA512
7d603c8382aaf8ac5b44442548528082b17e0415b11e52be6262d8be0ec6111b1447816b80393d1093e4600f69ab1fdd79646ce99f90c7911d770cbfa0ef0df0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-