General
-
Target
Order_confirmation#7682712.exe.bin
-
Size
404KB
-
Sample
230501-yl9raaaa21
-
MD5
bd43373032914b158e1c011251f7402b
-
SHA1
849d897908340069afadb1ca61bc8a9bbb1f18b1
-
SHA256
accc20bc6b2bb01f68c7790e0c5a3a62bc30f8366fb6db99a2315a42a8ed7b2b
-
SHA512
5eb9762735626bfb754eee7ebe7d28dad1f9351174d08dc41b150bfb075d405a79bd688c7b2b235902bc0dfb6ee9de36d06d720e38a236d94bed6b5d6e59bd3f
-
SSDEEP
6144:y5eTTxmv95jyNv0qqSsT1OjM/skojeLNMEq8rODSzqjs9OR:yETTxmVpyNUlT8j2oSdq8Cwus9
Static task
static1
Behavioral task
behavioral1
Sample
Order_confirmation#7682712.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Order_confirmation#7682712.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.pacificbluesmashrepairs.com.au - Port:
587 - Username:
[email protected] - Password:
samim1989 - Email To:
[email protected]
Targets
-
-
Target
Order_confirmation#7682712.exe.bin
-
Size
404KB
-
MD5
bd43373032914b158e1c011251f7402b
-
SHA1
849d897908340069afadb1ca61bc8a9bbb1f18b1
-
SHA256
accc20bc6b2bb01f68c7790e0c5a3a62bc30f8366fb6db99a2315a42a8ed7b2b
-
SHA512
5eb9762735626bfb754eee7ebe7d28dad1f9351174d08dc41b150bfb075d405a79bd688c7b2b235902bc0dfb6ee9de36d06d720e38a236d94bed6b5d6e59bd3f
-
SSDEEP
6144:y5eTTxmv95jyNv0qqSsT1OjM/skojeLNMEq8rODSzqjs9OR:yETTxmVpyNUlT8j2oSdq8Cwus9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-