General
-
Target
Invoice & Packing list.exe
-
Size
267KB
-
Sample
230306-q6ywhscf43
-
MD5
f8b5f953fff3d297c2019ab082e88ffd
-
SHA1
ebd517b6c7a6f3101f077cd217eec2c1f55c50d6
-
SHA256
407a3b446f6394fe028e808af4a5e57bcb9a3b351858290abeef7fa1213bd712
-
SHA512
5144121b2b7c1bab651c107aee7979f0185ac659f23db8a7e17c6df845997b2d3d6cd05142b0b32fb71f5555d1114e3c1c1da81756aa0852942821242a67882d
-
SSDEEP
6144:PYa6clxmqqQBkUuPjPUgDmMaXk+Jlgs/kDP/CinRm7liGXjANq:PYCPzqQB1u7PUgcXLMLjnoiijAQ
Static task
static1
Behavioral task
behavioral1
Sample
Invoice & Packing list.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Invoice & Packing list.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
Invoice & Packing list.exe
-
Size
267KB
-
MD5
f8b5f953fff3d297c2019ab082e88ffd
-
SHA1
ebd517b6c7a6f3101f077cd217eec2c1f55c50d6
-
SHA256
407a3b446f6394fe028e808af4a5e57bcb9a3b351858290abeef7fa1213bd712
-
SHA512
5144121b2b7c1bab651c107aee7979f0185ac659f23db8a7e17c6df845997b2d3d6cd05142b0b32fb71f5555d1114e3c1c1da81756aa0852942821242a67882d
-
SSDEEP
6144:PYa6clxmqqQBkUuPjPUgDmMaXk+Jlgs/kDP/CinRm7liGXjANq:PYCPzqQB1u7PUgcXLMLjnoiijAQ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-