General
-
Target
UrgentRequest.exe.bin
-
Size
489KB
-
Sample
230505-ztl6maee94
-
MD5
ad3aacf6f8e0905d67f88ba2c31f69d7
-
SHA1
3a867a2b0e24f98281ed5138866adb0b9bcdaac1
-
SHA256
f77c28f545a934ce820d6f8825455540e032bb0bc19d81100dc5c6ea4a349114
-
SHA512
812626af14eed4fa2951957b103f88f61a35f75d4a99f19beb13b97828a2c1af43520b51060fd778236723470c8a9db618f22dba73dfdfca618e86c3395909bf
-
SSDEEP
12288:IQ/ZfsqjIxTvEOVz329xVUoLSYuZEmaOh:T3IVEm729P3LSYYqOh
Static task
static1
Behavioral task
behavioral1
Sample
UrgentRequest.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
UrgentRequest.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.southernboilers.org - Port:
587 - Username:
[email protected] - Password:
Sksmoke2018# - Email To:
[email protected]
Targets
-
-
Target
UrgentRequest.exe.bin
-
Size
489KB
-
MD5
ad3aacf6f8e0905d67f88ba2c31f69d7
-
SHA1
3a867a2b0e24f98281ed5138866adb0b9bcdaac1
-
SHA256
f77c28f545a934ce820d6f8825455540e032bb0bc19d81100dc5c6ea4a349114
-
SHA512
812626af14eed4fa2951957b103f88f61a35f75d4a99f19beb13b97828a2c1af43520b51060fd778236723470c8a9db618f22dba73dfdfca618e86c3395909bf
-
SSDEEP
12288:IQ/ZfsqjIxTvEOVz329xVUoLSYuZEmaOh:T3IVEm729P3LSYYqOh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-