General
-
Target
IMG_6087721402pdf.exe.bin
-
Size
1.4MB
-
Sample
230501-ydgqjahg9v
-
MD5
3334a90396005ed7feeae9dd18f7e678
-
SHA1
6a6e79258939f7a81eb64e9605bc73ad89164d9d
-
SHA256
4278d68fa6e6266797239e12bed7b937b48f1f80decc16261b84a485f4b08ea0
-
SHA512
dafad78a3b235612ccdf6e2bb2cdd6ca915b4b7ad7a70ea4608a75bce3bca5e31a4b4ecdbdbbcbb042acf84bff9cc1496fc7bc364680db64f97dbdd5a6082673
-
SSDEEP
24576:WPfqCaMh2GVnWf0UAz7yabl+XMuMberEsAxNzZhs:XGg0N35i0
Static task
static1
Behavioral task
behavioral1
Sample
IMG_6087721402pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
IMG_6087721402pdf.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
logxtai.shop - Port:
587 - Username:
[email protected] - Password:
g%=fFsvUUCI* - Email To:
[email protected]
Targets
-
-
Target
IMG_6087721402pdf.exe.bin
-
Size
1.4MB
-
MD5
3334a90396005ed7feeae9dd18f7e678
-
SHA1
6a6e79258939f7a81eb64e9605bc73ad89164d9d
-
SHA256
4278d68fa6e6266797239e12bed7b937b48f1f80decc16261b84a485f4b08ea0
-
SHA512
dafad78a3b235612ccdf6e2bb2cdd6ca915b4b7ad7a70ea4608a75bce3bca5e31a4b4ecdbdbbcbb042acf84bff9cc1496fc7bc364680db64f97dbdd5a6082673
-
SSDEEP
24576:WPfqCaMh2GVnWf0UAz7yabl+XMuMberEsAxNzZhs:XGg0N35i0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-