General
-
Target
Customer Credit Transfer.img
-
Size
1.4MB
-
Sample
221020-l15pnagegp
-
MD5
bf49c854997936ddc18fb144bc02ae66
-
SHA1
da20bd84d6f5407d0d9c973e703cac294902f99e
-
SHA256
d362820595a2af8f945673bff5504d37b6425112be9cc0256ae17ade7aaed13f
-
SHA512
d1034a17dad009524baa8fcd22054e98e3e2646053375101e375107b4fc9531fe7f35b847f2f072fb49aa18742d5ca25dd40883e3b1610759ddc222819af471e
-
SSDEEP
12288:ezfEu5TZBWRBO/TG6g/CdXx92Ltm+lya4gylPsIcIMU8fYtYiAUz:aZW2SZl94gylEIcIB8GJz
Static task
static1
Behavioral task
behavioral1
Sample
CUSTOMER.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
CUSTOMER.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
CUSTOMER.EXE
-
Size
839KB
-
MD5
5f823a1ea6d64bfdfde655735cd2bd53
-
SHA1
0edd4a3375d860ff3f5c66f4a2843994ba9f227f
-
SHA256
8e4b7cb2dd61f0663ee762183b5af3713dbe7bba63b780805270d4d4dbd6dcb2
-
SHA512
78982807412333116ca7513dbb682b256557cd2df62e77c5f10d4799ceaab18eb3fe2a24124f9668c373d890f565eacb7661d5d4f8f652c93c93c39a522b2a71
-
SSDEEP
12288:MzfEu5TZBWRBO/TG6g/CdXx92Ltm+lya4gylPsIcIMU8fYtYiAUz:EZW2SZl94gylEIcIB8GJz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-