General
-
Target
pedido de compra.exe
-
Size
708KB
-
Sample
230704-ggv9nacg21
-
MD5
3a701c8755f46b8a7a1dfa3d7abafa9b
-
SHA1
643c4c334666a0feefd04f51a8f01cc20518910f
-
SHA256
da66584117fbc144b1db99904d9f81dbaa7a7b37e5dc73f60761b79f4b800648
-
SHA512
821c32c742325636da86be5c48576f0a75f6d58640eb8015da0ee9e15552bf724a26249b7ffd9972cae9462ccd803c4b5c0ddd3269495411b9a25f1ea8d9f873
-
SSDEEP
12288:MnwDK+bmmtGO8j6fWRpN2fH/Bv2+wZdPdTQfgsOESjDDIAzF/Ze:MnwDK+DB3fWF2P/InbQDSjoA1
Static task
static1
Behavioral task
behavioral1
Sample
pedido de compra.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
pedido de compra.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.kennettextile.co.th - Port:
587 - Username:
[email protected] - Password:
M@1h5s2q - Email To:
[email protected]
Targets
-
-
Target
pedido de compra.exe
-
Size
708KB
-
MD5
3a701c8755f46b8a7a1dfa3d7abafa9b
-
SHA1
643c4c334666a0feefd04f51a8f01cc20518910f
-
SHA256
da66584117fbc144b1db99904d9f81dbaa7a7b37e5dc73f60761b79f4b800648
-
SHA512
821c32c742325636da86be5c48576f0a75f6d58640eb8015da0ee9e15552bf724a26249b7ffd9972cae9462ccd803c4b5c0ddd3269495411b9a25f1ea8d9f873
-
SSDEEP
12288:MnwDK+bmmtGO8j6fWRpN2fH/Bv2+wZdPdTQfgsOESjDDIAzF/Ze:MnwDK+DB3fWF2P/InbQDSjoA1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-