General
-
Target
ab4da6a6eb17001b2427284b5007cd62a6cf724ba1546a13420a40fb4ecde06d
-
Size
553KB
-
Sample
220521-nhlj6sghcq
-
MD5
0d9af17e7af59794c369d1c480a4dc1d
-
SHA1
3d74c23fecabe7389aedd61b07f0ab23cf11ecdd
-
SHA256
ab4da6a6eb17001b2427284b5007cd62a6cf724ba1546a13420a40fb4ecde06d
-
SHA512
a55bec9c2e0e5ea0e64b8366c012db07a53b15facbb857786548ca9ef2631a6279d76f537c834df7ce0b7da3d87db6b65e936f112e767b9eaa12243a0cea9cc2
Static task
static1
Behavioral task
behavioral1
Sample
ab4da6a6eb17001b2427284b5007cd62a6cf724ba1546a13420a40fb4ecde06d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ab4da6a6eb17001b2427284b5007cd62a6cf724ba1546a13420a40fb4ecde06d.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
333link00win0303
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
333link00win0303
Targets
-
-
Target
ab4da6a6eb17001b2427284b5007cd62a6cf724ba1546a13420a40fb4ecde06d
-
Size
553KB
-
MD5
0d9af17e7af59794c369d1c480a4dc1d
-
SHA1
3d74c23fecabe7389aedd61b07f0ab23cf11ecdd
-
SHA256
ab4da6a6eb17001b2427284b5007cd62a6cf724ba1546a13420a40fb4ecde06d
-
SHA512
a55bec9c2e0e5ea0e64b8366c012db07a53b15facbb857786548ca9ef2631a6279d76f537c834df7ce0b7da3d87db6b65e936f112e767b9eaa12243a0cea9cc2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-