General
-
Target
FACTURA 009-546#.r09
-
Size
820KB
-
Sample
221027-y417vsdcf8
-
MD5
cdaf40e7e2db27b1a3788248e40113dd
-
SHA1
59cc3578c43432b92c5dfbab748bc4d43f2162ee
-
SHA256
6afbc1781812f1b035bf50dc3a9fa694f84bd36e4fbebcac4951003bab35b2a7
-
SHA512
3ed01da04ac5dcaabd8a37f3d1c6acffa5aef731761f4a2140c37deadf3675d0d465667ead62efe1912166b0e59f45f7fe5f8713a3b5d60d70fd60355debe595
-
SSDEEP
24576:iBUpQvbszjw3UPLqY454m7vyeaNvPJFbPZcJ8hqwEXk:iBUivbszc3FP5L7+FrbRcPwik
Static task
static1
Behavioral task
behavioral1
Sample
FACTURA 009-546#.rar
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
FACTURA 009-546#.rar
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
FACTURA 009-546#.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
FACTURA 009-546#.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
FACTURA 009-546#.r09
-
Size
820KB
-
MD5
cdaf40e7e2db27b1a3788248e40113dd
-
SHA1
59cc3578c43432b92c5dfbab748bc4d43f2162ee
-
SHA256
6afbc1781812f1b035bf50dc3a9fa694f84bd36e4fbebcac4951003bab35b2a7
-
SHA512
3ed01da04ac5dcaabd8a37f3d1c6acffa5aef731761f4a2140c37deadf3675d0d465667ead62efe1912166b0e59f45f7fe5f8713a3b5d60d70fd60355debe595
-
SSDEEP
24576:iBUpQvbszjw3UPLqY454m7vyeaNvPJFbPZcJ8hqwEXk:iBUivbszc3FP5L7+FrbRcPwik
Score3/10 -
-
-
Target
FACTURA 009-546#.exe
-
Size
901KB
-
MD5
acf72005feb7b290e54883318894d0c4
-
SHA1
773c4131bb80d19e3be7d7d10bc27263a25554e4
-
SHA256
b52eb07ea0f121ccccbc569c99bbecb121a212635ab21d7af7250a7fbb33e704
-
SHA512
ab2dbcb9c5a0e26a9a6ab65f6bf4bad366b91cab25460dab8bcd52814d07828ceaa98d7d47ddb6b94de1ecdec59025dc8013fc7703222dc6f578f2af45f55d5d
-
SSDEEP
12288:8Yh702iNpj3WqoL98eSZkaJtQqg5UDBXORb0mY9q4ehEK89fIDBE8ee2iODuxRp:O133WqoTiJm3COKmZ7J89fp8yI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-