General
-
Target
Our order.exe
-
Size
870KB
-
Sample
221206-whf9fsae78
-
MD5
d45152a4b8d2922dfa7dfda2c70cff1a
-
SHA1
9a562efcf54e0e912ead4610de76a065d732eeab
-
SHA256
a36c5d34f9b0de2069fb875c2b681145352c03a81a387d610301d98143a7fbee
-
SHA512
cab1db090f4ed315657af2a3ba69671b50bf04b67d547d2c40c0d89f6fafdb23d73ccfb25840c6ac43628c3378b236c2d212ac9d7d181229e9d21fb929f00b5e
-
SSDEEP
12288:ucNUejKUYkD75gIFOxz0Z4e0vCCGHO8oswKp3WtjmahgKZ/nXt7virmWhlGLaQYI:FNlrYk2IFCz/FCO8rwY32
Static task
static1
Behavioral task
behavioral1
Sample
Our order.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Our order.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
host39.registrar-servers.com - Port:
587 - Username:
[email protected] - Password:
})cZs aj5Xr; C
Extracted
agenttesla
Protocol: smtp- Host:
host39.registrar-servers.com - Port:
587 - Username:
[email protected] - Password:
})cZs aj5Xr; C
Targets
-
-
Target
Our order.exe
-
Size
870KB
-
MD5
d45152a4b8d2922dfa7dfda2c70cff1a
-
SHA1
9a562efcf54e0e912ead4610de76a065d732eeab
-
SHA256
a36c5d34f9b0de2069fb875c2b681145352c03a81a387d610301d98143a7fbee
-
SHA512
cab1db090f4ed315657af2a3ba69671b50bf04b67d547d2c40c0d89f6fafdb23d73ccfb25840c6ac43628c3378b236c2d212ac9d7d181229e9d21fb929f00b5e
-
SSDEEP
12288:ucNUejKUYkD75gIFOxz0Z4e0vCCGHO8oswKp3WtjmahgKZ/nXt7virmWhlGLaQYI:FNlrYk2IFCz/FCO8rwY32
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-