General
-
Target
PURCHASE ORDER.exe
-
Size
980.7MB
-
Sample
230531-kscs8sdh27
-
MD5
bd703b78deb5f77d1d63d971d34fae6a
-
SHA1
df8767084e486adcad0cb810f5f8c0c8c6af8e08
-
SHA256
5dd5fd62ad29bafab6dcb00d0cf996bc98ab86f688f249298b325574b127768d
-
SHA512
f23a39f437a2b608c6e502456de533478b8a2dcd9a6c545ad822044cc60f6b3b4fab783a599d5b38ad949944adb7b1688c176d826a0e3847e529e1b5907d44a7
-
SSDEEP
12288:AjAMTihh6xhZ6OrOLY5iZpvlrVq2Tx/dsZk8pscJm3P678HhhNktvR5u:HMUgh8y44yFlQsC28428BhqR5u
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6019964522:AAF4GL7tiulCBCd_CdLMmgPQ-2YhOYdHGMo/
Targets
-
-
Target
PURCHASE ORDER.exe
-
Size
980.7MB
-
MD5
bd703b78deb5f77d1d63d971d34fae6a
-
SHA1
df8767084e486adcad0cb810f5f8c0c8c6af8e08
-
SHA256
5dd5fd62ad29bafab6dcb00d0cf996bc98ab86f688f249298b325574b127768d
-
SHA512
f23a39f437a2b608c6e502456de533478b8a2dcd9a6c545ad822044cc60f6b3b4fab783a599d5b38ad949944adb7b1688c176d826a0e3847e529e1b5907d44a7
-
SSDEEP
12288:AjAMTihh6xhZ6OrOLY5iZpvlrVq2Tx/dsZk8pscJm3P678HhhNktvR5u:HMUgh8y44yFlQsC28428BhqR5u
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-