General
-
Target
hardroot-01.exe
-
Size
611KB
-
Sample
220522-f5kmdsbbeq
-
MD5
186652d7ffc900eb5bf55e72c7ff07d8
-
SHA1
a298ae3f26515bf2795dff5e415f01184e00fee0
-
SHA256
372f3ede21d2dc6c7f2ef29b36a29f8473ddb9d069c5a29cab5d26f9b6f3ecda
-
SHA512
2f5088b8d7091a1525d49d40c2ece63a684462f552e6cbe617d83da28e2365a0caa7864b556acef1138f2c08c8cdd95053cbd3642afb705c2b7313546223ee84
Static task
static1
Behavioral task
behavioral1
Sample
hardroot-01.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
hardroot-01.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.hardroot.biz - Port:
587 - Username:
home@hardroot.biz - Password:
bigboy247
Extracted
agenttesla
Protocol: smtp- Host:
mail.hardroot.biz - Port:
587 - Username:
home@hardroot.biz - Password:
bigboy247 - Email To:
doc@hardroot.biz
Targets
-
-
Target
hardroot-01.exe
-
Size
611KB
-
MD5
186652d7ffc900eb5bf55e72c7ff07d8
-
SHA1
a298ae3f26515bf2795dff5e415f01184e00fee0
-
SHA256
372f3ede21d2dc6c7f2ef29b36a29f8473ddb9d069c5a29cab5d26f9b6f3ecda
-
SHA512
2f5088b8d7091a1525d49d40c2ece63a684462f552e6cbe617d83da28e2365a0caa7864b556acef1138f2c08c8cdd95053cbd3642afb705c2b7313546223ee84
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-