General
-
Target
4ad19f3b83382bd4874693be46fae7c3.bin
-
Size
463KB
-
Sample
230611-brpa7sha2s
-
MD5
b56d28e27bef3238de8ec16a11210915
-
SHA1
34b48893d84f29b4bcc9b904923aea6710551eed
-
SHA256
b70a1407fc2f0a2eced541c4579404748c0c1a75570d9d773ffdbc73fe6a9bec
-
SHA512
c9c4670b9770ec1ef1084aca53f7e1c81aab76eec9a76e16ba39b37eabe6fc4af8fe08dc19107201ce3072f47698ff96daed532b508a8f2608a3d881a39b6a8b
-
SSDEEP
12288:SQU+f8uLfp58lI6CrQVstQmXEF1ytyJduE:vP0uTP82XQatitqE
Static task
static1
Behavioral task
behavioral1
Sample
Revised Proforma Invoice WSI116850PF.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Revised Proforma Invoice WSI116850PF.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sorincrop.com - Port:
587 - Username:
[email protected] - Password:
blessing202321@!$%btr - Email To:
[email protected]
Targets
-
-
Target
Revised Proforma Invoice WSI116850PF.exe
-
Size
884KB
-
MD5
eac45e7940e2536662d67f5c2bb888f8
-
SHA1
99accc50514d38dfd74883b10789a471f4cc2bca
-
SHA256
3e1f623f0b2c1b85bcbca396bbeb79e06db39138a004c14201827ed1a8ca377a
-
SHA512
9053620605e242827e03dc5632e55dfef2ad839a63f5ad2be0d6e0a0a750e46c20e6d944623518e68753838f1629fe72ef5a48f780d12fbc33afef348ce16fc3
-
SSDEEP
12288:EW0lwFqIwr+i3Tp3OQwN5V2cKxZMXdKkDkB0c:RZFwTp3duL2xxGKoy0c
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-