General
-
Target
e2625826221fbe561858c4203a64b2112d4537ce823b25ba984211520c6f3d50
-
Size
567KB
-
Sample
220521-xh15asbgf7
-
MD5
6b1c72ddf6796f539e571cb0f154b741
-
SHA1
8678b5c4f7a019d21be1369ef2cd32f0fe11673d
-
SHA256
e2625826221fbe561858c4203a64b2112d4537ce823b25ba984211520c6f3d50
-
SHA512
b87a0ff62908d30d5d2210364c7cb7ce1b6c73dd5d11f0cc916c4c5be2c5c0b6b3e8958688132a1f425159ab790e3f5e4015947f72e68db76ac878b2b79049ca
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-NNC29720M7493.iso.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
RFQ-NNC29720M7493.iso.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
datastore1840@yandex.com - Password:
opjis0123
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
datastore1840@yandex.com - Password:
opjis0123
Targets
-
-
Target
RFQ-NNC29720M7493.iso.exe
-
Size
612KB
-
MD5
682f9afc2848375728c3e07632d4dc58
-
SHA1
295690e7951ec7bb00ef68a521ecb8b9403a52e7
-
SHA256
9ef4db3fccbcfe3601f7ff80f7850a6533300f7e65a8d1edd7338052877254c4
-
SHA512
9af278a79430fd5ccd443592ff28d87fe720f63428ada239e5ac287679fa47a725112216394dec167d1c8cbc2832129a3f38d3b66592375ef22b20395a1edf5a
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-