General
-
Target
Pro-forma_invoice9122022.exe
-
Size
455KB
-
Sample
221209-rrae2sdd38
-
MD5
9c9543736a245130d2219c23d8e96394
-
SHA1
24f2edb6cbf12276e97ba83106de5739a195e96a
-
SHA256
b67c389fc71d512caba10e28fb950648a2971e42581698e1191f7583da2b8309
-
SHA512
9bc6a6beb1105e9df254228f9970fc0f4d36016824790feba85eb520c947e87d1d465c9367b05454f7d669c3ed03c60da159b47a7c5378dc823d08ac02eba62c
-
SSDEEP
12288:bbufg79EqZIAD8OEUMSejdxjmxHFyMsjDWGe:mfghxe2iUMSejdMHI3nW7
Static task
static1
Behavioral task
behavioral1
Sample
Pro-forma_invoice9122022.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Pro-forma_invoice9122022.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pumaelektrik.com - Port:
587 - Username:
[email protected] - Password:
cspen@#$123 - Email To:
[email protected]
Targets
-
-
Target
Pro-forma_invoice9122022.exe
-
Size
455KB
-
MD5
9c9543736a245130d2219c23d8e96394
-
SHA1
24f2edb6cbf12276e97ba83106de5739a195e96a
-
SHA256
b67c389fc71d512caba10e28fb950648a2971e42581698e1191f7583da2b8309
-
SHA512
9bc6a6beb1105e9df254228f9970fc0f4d36016824790feba85eb520c947e87d1d465c9367b05454f7d669c3ed03c60da159b47a7c5378dc823d08ac02eba62c
-
SSDEEP
12288:bbufg79EqZIAD8OEUMSejdxjmxHFyMsjDWGe:mfghxe2iUMSejdMHI3nW7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-