General
-
Target
5f574d1dbab7999f231424caf6e6e7a262acb34185dc69fa7420fd52400838c6
-
Size
306KB
-
Sample
220521-nzlaqshecp
-
MD5
8a7a2c35d874e4cd26360eeb59ad3505
-
SHA1
282b36afa95e9a02ec4f22337504a5e641a12cc1
-
SHA256
5f574d1dbab7999f231424caf6e6e7a262acb34185dc69fa7420fd52400838c6
-
SHA512
afb03c95a4b9b62e461d234ce52c05bc4f77b7a22a68b6df8df8a46ef191665bb890ffd79cb8c86c14d12c63e92635f160cb93a013c4f80ca3b45849a3bd341c
Static task
static1
Behavioral task
behavioral1
Sample
BOQ.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
BOQ.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
noni@damienzy.xyz - Password:
@damienzy.xyz2240
Targets
-
-
Target
BOQ.exe
-
Size
691KB
-
MD5
a18ec2dd546e68f141c8dd4448b28413
-
SHA1
bfd5029a05228e978bd4619d8e3d48bc675a23df
-
SHA256
11f9f60f3980a42f06858e5e684b8dedb4b134e9bb357a1043ded9a96353744b
-
SHA512
7d27ae0de36078bd2bf09af1cc86023f82eb5cd3a93b53336da1b67bcb6acdf72c74e565594bce7660e12fb970ffe7f78238e3d121f9d99656838396ea12a592
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-