General
-
Target
rPEDIDON1525.exe.bin
-
Size
578KB
-
Sample
230505-zrcjeagg4s
-
MD5
d9380760cb8961a7aabe2fffd83b1296
-
SHA1
70c61249c207a0d42fef27f830f978fa5ac9610b
-
SHA256
d26b936b2d61001819fc4e99a224224d35edd9fd716bfe7bc5dbd431f584150e
-
SHA512
2602f887156d9feee028f559de2ce282bf43bcbd1a008308d3e11996d5ac159d07249f5e57206ff646fbefdd2e9910558751937b33a79de7f477dfd04430c453
-
SSDEEP
12288:l89hFSSKDgBzCddx27SuzW9KcfTAyrRQ0tqwDhp:l8bs7DgBz62BWwOAyr6tshp
Static task
static1
Behavioral task
behavioral1
Sample
rPEDIDON1525.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
rPEDIDON1525.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1360033246:AAF6H8m6YrL09doyxtsvJzZ_cIl__BCF4aU/sendDocument
Targets
-
-
Target
rPEDIDON1525.exe.bin
-
Size
578KB
-
MD5
d9380760cb8961a7aabe2fffd83b1296
-
SHA1
70c61249c207a0d42fef27f830f978fa5ac9610b
-
SHA256
d26b936b2d61001819fc4e99a224224d35edd9fd716bfe7bc5dbd431f584150e
-
SHA512
2602f887156d9feee028f559de2ce282bf43bcbd1a008308d3e11996d5ac159d07249f5e57206ff646fbefdd2e9910558751937b33a79de7f477dfd04430c453
-
SSDEEP
12288:l89hFSSKDgBzCddx27SuzW9KcfTAyrRQ0tqwDhp:l8bs7DgBz62BWwOAyr6tshp
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-