General
-
Target
ez.Ps1
-
Size
424KB
-
Sample
221125-wqklvagh9x
-
MD5
79e5aa477b91037f411652199fec4b47
-
SHA1
4d68ed5dd420f2ac0a8b3a1f0f5ec33f2c605bf3
-
SHA256
cb94129961f8d8a26ce13e84d199ea1733057adea3c0754abcf7310fa03443d4
-
SHA512
d4dd01b5935d210437d33b4a01417dd05328eb4999e0ea325ac4bced2fc63ee2679f67979bff76cb790f3d8a21604edc4d83caf13b65f5448026198a78cbee21
-
SSDEEP
6144:omGppOv8jvOtF7GryCNV81Q7NA4S6DCICQupftzJgEReLxqs2tZ4+:omE2c2tF7XCXRNNJfyftzJgyelqsH+
Static task
static1
Behavioral task
behavioral1
Sample
ez.ps1
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ez.ps1
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.leonardfood.com - Port:
587 - Username:
[email protected] - Password:
K@rimi95
Extracted
agenttesla
Protocol: smtp- Host:
smtp.leonardfood.com - Port:
587 - Username:
[email protected] - Password:
K@rimi95 - Email To:
[email protected]
Targets
-
-
Target
ez.Ps1
-
Size
424KB
-
MD5
79e5aa477b91037f411652199fec4b47
-
SHA1
4d68ed5dd420f2ac0a8b3a1f0f5ec33f2c605bf3
-
SHA256
cb94129961f8d8a26ce13e84d199ea1733057adea3c0754abcf7310fa03443d4
-
SHA512
d4dd01b5935d210437d33b4a01417dd05328eb4999e0ea325ac4bced2fc63ee2679f67979bff76cb790f3d8a21604edc4d83caf13b65f5448026198a78cbee21
-
SSDEEP
6144:omGppOv8jvOtF7GryCNV81Q7NA4S6DCICQupftzJgEReLxqs2tZ4+:omE2c2tF7XCXRNNJfyftzJgyelqsH+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-