General
-
Target
shippingdocuments.exe.bin
-
Size
463KB
-
Sample
230505-zr9h5see27
-
MD5
1572bb732795b09ce8469e615ffb010d
-
SHA1
ccfa832de9028ab78dd2d9554e8b8d95b275bc9c
-
SHA256
858d78e45567e3b39affd12795d7b16fbc9af5d725ee7a0dffc10a86ca22133d
-
SHA512
581e68da17ed09656d5e522e5ff7f8507885eff7975c4a6177df21d9e27162704dd02e55beb62f056fd6cfaa0229996ed99e4aee99cb72bbaf3c0c42c324825b
-
SSDEEP
12288:l7cfm2Ib++4UWomGiUjcI0tlgx21XfR8d6:lQObH4rdNI0K2hfS6
Static task
static1
Behavioral task
behavioral1
Sample
shippingdocuments.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
shippingdocuments.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.lubdub.com - Port:
587 - Username:
[email protected] - Password:
J-y!2e_fWMH_XP8F_008 - Email To:
[email protected]
Targets
-
-
Target
shippingdocuments.exe.bin
-
Size
463KB
-
MD5
1572bb732795b09ce8469e615ffb010d
-
SHA1
ccfa832de9028ab78dd2d9554e8b8d95b275bc9c
-
SHA256
858d78e45567e3b39affd12795d7b16fbc9af5d725ee7a0dffc10a86ca22133d
-
SHA512
581e68da17ed09656d5e522e5ff7f8507885eff7975c4a6177df21d9e27162704dd02e55beb62f056fd6cfaa0229996ed99e4aee99cb72bbaf3c0c42c324825b
-
SSDEEP
12288:l7cfm2Ib++4UWomGiUjcI0tlgx21XfR8d6:lQObH4rdNI0K2hfS6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-