General
-
Target
75cfff8716305022e28387f46165937965c226c0cb410c58c32302af49534584
-
Size
346KB
-
Sample
220521-nr3j2shbeq
-
MD5
9940d65f9e971328645bb9e8f01b313b
-
SHA1
527afdd0896049b05c2887ea1ed2ffa6fa5f9414
-
SHA256
75cfff8716305022e28387f46165937965c226c0cb410c58c32302af49534584
-
SHA512
e4b543c92d0aa1125290a3ff3413678607fe8eeb0675d9f77b1830802c37e8d5a14015187eebf67c158cde0ae466e9403298a422bd94fcfaf495b9ba78a42a52
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
07062487004
Targets
-
-
Target
Purchase Order.exe
-
Size
489KB
-
MD5
e2617fc4c82436c96092b5b812bfa8ad
-
SHA1
9337e67fb93d8fec2c64f08156389ae313297faa
-
SHA256
777724ddfa6e73aca46c52991e3805ac1fabee9359fa362d9e084f4d2461fa04
-
SHA512
96708fde6622ba1d27e349c116c25cea047123cd0d2c3d9e152a81d1c36e5048a9bb478917c13aea174d77ae68447b4634d253b284dcaaa6e37c5443fd4cd5e1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-