General
-
Target
URGENT REQUIREMENT.zip
-
Size
475KB
-
Sample
221129-qmsv6acg23
-
MD5
2d2000ae7f5fe844c579d1e90f455b06
-
SHA1
ffcc73d7319bf496f38bb53950caf89acdd4b603
-
SHA256
21a3b261641329b4b3fbb79d32476bdd05a7a4453848cd0cd41407b90b2948e8
-
SHA512
6f8f93cdcb6c19f7ce7a0bcbdb6ad3263766d4fa46e74d0b586d3ce098b19addeb16d6d5080bc5f2cd7fc3adb936462cc6cb62184b3480eb5a0f66db71066c1e
-
SSDEEP
12288:1dvfUKAHgug+bms2h+mqHlwCsRpA6Mm6CHR:1dvfUDg+bjHwk6MmrHR
Static task
static1
Behavioral task
behavioral1
Sample
URGENT REQUIREMENT.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
URGENT REQUIREMENT.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.svcnc.com - Port:
587 - Username:
krupakar@svcnc.com - Password:
Krupashine@6791 - Email To:
decenmomodou20@gmail.com
Targets
-
-
Target
URGENT REQUIREMENT.exe
-
Size
478KB
-
MD5
9d97e728e9d190e4be44cd0e2b6af94e
-
SHA1
f14cd79d94d5edf2f9b006689f468baa25e971c4
-
SHA256
81278e61b365975c3ba6eb47c4734c4831e2488dfd3357cf8d0d018b4a57123f
-
SHA512
c6765a669724cb5310501d855a87c194f3df9494dee1a71e08519a197d36f6ba698064e136ef290c2e8c2dabe9c65ee0cb42a5d2ae047e8c75c30d40d9a946a1
-
SSDEEP
12288:mT9ZvF2KWHeaAabCMWh+mgXlwCE9Ra6Mu2C/E:+9ZvF2zAabjJAW6Mu3/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-