General
-
Target
db2cc7258075d37820ed3344f5dcc4784be1ac8cc33a6d02627ea3dccf06b5f6
-
Size
381KB
-
Sample
220524-1aatxsceam
-
MD5
cacf618c8c192f885722c4c4386da202
-
SHA1
08617dfd366a53afc487f48e447434d2a0cce058
-
SHA256
db2cc7258075d37820ed3344f5dcc4784be1ac8cc33a6d02627ea3dccf06b5f6
-
SHA512
a817cf4b9b4927bdd190aff7cece2a41de9eeafc6814f72d9e96c39340d0c27d9f64de4c94259c34e780897702701bd032aa82e98ba6f3b340dcea690247bea7
Static task
static1
Behavioral task
behavioral1
Sample
db2cc7258075d37820ed3344f5dcc4784be1ac8cc33a6d02627ea3dccf06b5f6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
db2cc7258075d37820ed3344f5dcc4784be1ac8cc33a6d02627ea3dccf06b5f6.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
tonyrikardo@yandex.com - Password:
akachukwu123@
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
tonyrikardo@yandex.com - Password:
akachukwu123@
Targets
-
-
Target
db2cc7258075d37820ed3344f5dcc4784be1ac8cc33a6d02627ea3dccf06b5f6
-
Size
381KB
-
MD5
cacf618c8c192f885722c4c4386da202
-
SHA1
08617dfd366a53afc487f48e447434d2a0cce058
-
SHA256
db2cc7258075d37820ed3344f5dcc4784be1ac8cc33a6d02627ea3dccf06b5f6
-
SHA512
a817cf4b9b4927bdd190aff7cece2a41de9eeafc6814f72d9e96c39340d0c27d9f64de4c94259c34e780897702701bd032aa82e98ba6f3b340dcea690247bea7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-