General
-
Target
NEW ORDER.exe
-
Size
914KB
-
Sample
230605-rg9gdsha45
-
MD5
0a9b021dcf06e963d9e2c67c42e72c7e
-
SHA1
b8f64b28336309457e69c0cd7469c2537096caee
-
SHA256
4ef1e5306c8b498a224a90dfc72feab99b888cd0cfd21aa017ba77e7871ae03d
-
SHA512
61be0d876a7dd918854e55da1c7cd59e32d64d394e5608b9a90a974deadf932ed568724543842437f63d6b38c609124540b53d069f8b22a6da0290d066ced0a8
-
SSDEEP
12288:TcVXiTB2QwkmlxfdeVsvARS5PkCPHgbzHRUNAoGtE8zpx3TzN0QeD2h8p:jhtaIRekCPHY8wtEOpx3Tz82
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
NEW ORDER.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.garagerobert.be - Port:
587 - Username:
[email protected] - Password:
dibi7779 - Email To:
[email protected]
Targets
-
-
Target
NEW ORDER.exe
-
Size
914KB
-
MD5
0a9b021dcf06e963d9e2c67c42e72c7e
-
SHA1
b8f64b28336309457e69c0cd7469c2537096caee
-
SHA256
4ef1e5306c8b498a224a90dfc72feab99b888cd0cfd21aa017ba77e7871ae03d
-
SHA512
61be0d876a7dd918854e55da1c7cd59e32d64d394e5608b9a90a974deadf932ed568724543842437f63d6b38c609124540b53d069f8b22a6da0290d066ced0a8
-
SSDEEP
12288:TcVXiTB2QwkmlxfdeVsvARS5PkCPHgbzHRUNAoGtE8zpx3TzN0QeD2h8p:jhtaIRekCPHY8wtEOpx3Tz82
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-