General
-
Target
URGENT ORDER.exe
-
Size
894KB
-
Sample
221207-h3sw4aeh49
-
MD5
b5f05b7766953e5239cef94adeb0ae65
-
SHA1
67d1414e2c7bd2c4e1c7425ed1cba34821ddb32a
-
SHA256
d688d50caf529da061dd41ff2eda749eb711a4b4b275e9d9c413b668fa320db5
-
SHA512
f6427b26dd035fe3d488a1d422200acca6948d9d1bff71865fe8456ac811f781c9bbddb18314313fa1b89d4502889820788ead99aa8a64e0dd2138cd81c413ed
-
SSDEEP
24576:8ycAKI2v2PbOmb6dzJQweNO+SfwzY3biMDxwg5+R0o:8ycpXv2imb6dzKc4zAbiM7eZ
Static task
static1
Behavioral task
behavioral1
Sample
URGENT ORDER.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
URGENT ORDER.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
bG^VamX7@@
Targets
-
-
Target
URGENT ORDER.exe
-
Size
894KB
-
MD5
b5f05b7766953e5239cef94adeb0ae65
-
SHA1
67d1414e2c7bd2c4e1c7425ed1cba34821ddb32a
-
SHA256
d688d50caf529da061dd41ff2eda749eb711a4b4b275e9d9c413b668fa320db5
-
SHA512
f6427b26dd035fe3d488a1d422200acca6948d9d1bff71865fe8456ac811f781c9bbddb18314313fa1b89d4502889820788ead99aa8a64e0dd2138cd81c413ed
-
SSDEEP
24576:8ycAKI2v2PbOmb6dzJQweNO+SfwzY3biMDxwg5+R0o:8ycpXv2imb6dzKc4zAbiM7eZ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-