General
-
Target
Order Specs#648365.pif
-
Size
819KB
-
Sample
230206-2xaccagc67
-
MD5
6f19a1678cf8a38f540de61b10e0fd58
-
SHA1
66c4b500a7f379fae8594499f1cc60b81368e596
-
SHA256
63d6f7010f333faf02cf2054e0b6e0e5ba81de40494fb6d6867fbced9b936e9e
-
SHA512
c9dc7ae029d33fb4fdeeafcd04d1dfb90e3506eaf9a883e360efcc3890a46f8ca448004730c6edf8fd77862cee1c6a63c44533f72ecd23429e785bdbcf150238
-
SSDEEP
24576:nVA3JrxN5IC54TWMHKBOD4nyf0ep+rCo6ic:KZtgiGSGr0
Static task
static1
Behavioral task
behavioral1
Sample
Order Specs#648365.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Order Specs#648365.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
hisgraceinme@yandex.com - Password:
General1248@1 - Email To:
hisgraceinme@yandex.com
Targets
-
-
Target
Order Specs#648365.pif
-
Size
819KB
-
MD5
6f19a1678cf8a38f540de61b10e0fd58
-
SHA1
66c4b500a7f379fae8594499f1cc60b81368e596
-
SHA256
63d6f7010f333faf02cf2054e0b6e0e5ba81de40494fb6d6867fbced9b936e9e
-
SHA512
c9dc7ae029d33fb4fdeeafcd04d1dfb90e3506eaf9a883e360efcc3890a46f8ca448004730c6edf8fd77862cee1c6a63c44533f72ecd23429e785bdbcf150238
-
SSDEEP
24576:nVA3JrxN5IC54TWMHKBOD4nyf0ep+rCo6ic:KZtgiGSGr0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-