General
-
Target
1868da831aed82d65c8072f66edbd437aa3866e69c6df1df78bbe9a50ae599d6
-
Size
442KB
-
Sample
220521-nxtjbshdcp
-
MD5
3ec009fbe922905f11ab77162e12e906
-
SHA1
266cd5b432c3ad03b201e30d986cf22b58ed1ab3
-
SHA256
1868da831aed82d65c8072f66edbd437aa3866e69c6df1df78bbe9a50ae599d6
-
SHA512
9815c9d123d5b6ce62b26cc811619561cdb23eb87e3b77bbe931d297144f0798259c92245ce56ecb12543cbf8ce1549c72065af3a079ad6ad671e2c87a96561c
Static task
static1
Behavioral task
behavioral1
Sample
SKM0399873728993450050584784.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SKM0399873728993450050584784.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.flood-protection.org - Port:
587 - Username:
gee@flood-protection.org - Password:
gee2424@
Extracted
Protocol: smtp- Host:
mail.flood-protection.org - Port:
587 - Username:
gee@flood-protection.org - Password:
gee2424@
Targets
-
-
Target
SKM0399873728993450050584784.exe
-
Size
798KB
-
MD5
50e06d7af3067192f6e2c9e332d7df06
-
SHA1
9ec0296b299aa4c1881245f9a620bb9aeddeff5a
-
SHA256
a2923551197772b1a9801410915c1d538f67cfaf50440f9096b17cc7a785cc72
-
SHA512
1dc4fd1e300a9e95a9e0c134068fa990c056663b3250e6b779a587fc2589a95040c9dc798ea9d977c65e292df3988ef949deb6f8675e09ac33fd79f7a75ae43d
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-