General
-
Target
0e103c7539cd3e961dc94175504c6a269eb5845a1e85c1c8936ad6303cae9c8f
-
Size
549KB
-
Sample
220521-n355bahfhn
-
MD5
0b8229dfc9672b2437c49732cd68ef2e
-
SHA1
d97fd0d776e8dd6e61757a26e9243e04f62b061d
-
SHA256
0e103c7539cd3e961dc94175504c6a269eb5845a1e85c1c8936ad6303cae9c8f
-
SHA512
ed5d4c4985f66ebe95d62b4486b19be0321181bb618192e1f9c7839c53e4a9cf1470454a9fefdc1a37aa6b1cfeb90fc114181f778ce4905b88bd346883821ecf
Static task
static1
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
New Order.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sunkyoungvina.com - Port:
587 - Username:
[email protected] - Password:
sun123
Targets
-
-
Target
New Order.exe
-
Size
801KB
-
MD5
831d4a721603de375526e83516add339
-
SHA1
91c8e91b3f62b251a77a081ee942ba03a98724fd
-
SHA256
0f75f6670487368f4ba9f5cf419f8f96433a2c4176bd2d07c4a12d0c83963abb
-
SHA512
afb4f6c226735b289619645377d269b56967be66438e60a9b9edf7637858f650db3ff0cde45f27c4ec9b092c62a142dbc3c8a565914086a93f0ee7012a61562f
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-