General
-
Target
NEW PURCHASE ORDER #099478656355T4747UY788898898.exe
-
Size
392KB
-
Sample
211025-tlsqjsgdb9
-
MD5
9134e2091e42890fcfb19b2b2967b37b
-
SHA1
3087aa36c2721922f5768cea095aaf64fead3e94
-
SHA256
725d7a5a757e46975ddd7e9d3b78e0569a7aaf52de1f740a68a714467746dcdc
-
SHA512
4520277f63120279eda6acad45288c3061a447960ba4696941a10c3d2ee1acb27e3fb0e745dc30c582a9cc07c610338c84955e5c0cfaa127062dc37165aeb00e
Static task
static1
Behavioral task
behavioral1
Sample
NEW PURCHASE ORDER #099478656355T4747UY788898898.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
NEW PURCHASE ORDER #099478656355T4747UY788898898.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.good-shepherd-ministries.org/ - Port:
21 - Username:
[email protected] - Password:
o4F-yQ@8[([G
Targets
-
-
Target
NEW PURCHASE ORDER #099478656355T4747UY788898898.exe
-
Size
392KB
-
MD5
9134e2091e42890fcfb19b2b2967b37b
-
SHA1
3087aa36c2721922f5768cea095aaf64fead3e94
-
SHA256
725d7a5a757e46975ddd7e9d3b78e0569a7aaf52de1f740a68a714467746dcdc
-
SHA512
4520277f63120279eda6acad45288c3061a447960ba4696941a10c3d2ee1acb27e3fb0e745dc30c582a9cc07c610338c84955e5c0cfaa127062dc37165aeb00e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-