General
-
Target
Shipment_notification1666547433.exe
-
Size
888KB
-
Sample
221208-p2cbaaaa59
-
MD5
ba631c1902f760f02c64b1830e842a66
-
SHA1
ea28af2c7957d7e90b19f5ef231e263c49aa12c9
-
SHA256
bdcb3bdaf0ab78c29f415a53f954442ee7075bc9c11d911d7f68cbe350e0506a
-
SHA512
7ee3a1f5a2505a38ce62ac6f32a32e3a9cd934dc165a49c9509da1d1bac8e862628ef218dcf056bf10422b3ed0b384786f6c06497a732a42b64b04af617b16cf
-
SSDEEP
24576:o2ibwG1RZrUSWoCI2sD+VUexWDxwg5+R:OwGi3dDV747e
Static task
static1
Behavioral task
behavioral1
Sample
Shipment_notification1666547433.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Shipment_notification1666547433.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pumaelektrik.com - Port:
587 - Username:
[email protected] - Password:
cspen@#$123 - Email To:
[email protected]
Targets
-
-
Target
Shipment_notification1666547433.exe
-
Size
888KB
-
MD5
ba631c1902f760f02c64b1830e842a66
-
SHA1
ea28af2c7957d7e90b19f5ef231e263c49aa12c9
-
SHA256
bdcb3bdaf0ab78c29f415a53f954442ee7075bc9c11d911d7f68cbe350e0506a
-
SHA512
7ee3a1f5a2505a38ce62ac6f32a32e3a9cd934dc165a49c9509da1d1bac8e862628ef218dcf056bf10422b3ed0b384786f6c06497a732a42b64b04af617b16cf
-
SSDEEP
24576:o2ibwG1RZrUSWoCI2sD+VUexWDxwg5+R:OwGi3dDV747e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-