General
-
Target
JULY_ORD.EXE
-
Size
658KB
-
Sample
230713-q1n45agh82
-
MD5
053a24723e63a239bfe888d416882e82
-
SHA1
fe99b710087d85aaa1d7df69484abbe43ea76bbc
-
SHA256
c534bdf0dbce6d4ae61450892f0210419cccc8285cab1c42bacd01077d394b62
-
SHA512
71f52fc455770af59ae1b67bc706de9a6de3c4ac438f3300fc962d6a1b06bc28473215f112c99ad6d7a8edc4d3d0b522a043cc01669cff78af106abf08f1a8e1
-
SSDEEP
12288:Lx9xR5AITvJYjXaiUp/BrUpk6MCFRRRCvfQbxJiEbV2M9iOhB290oCdWEK:Lx9xDAqvJ0Xc/+kPfQ1JhgMThBc0n
Static task
static1
Behavioral task
behavioral1
Sample
JULY_ORD.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
JULY_ORD.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://brdm.cloud - Port:
21 - Username:
[email protected] - Password:
%=!$*]0dPO8!
Targets
-
-
Target
JULY_ORD.EXE
-
Size
658KB
-
MD5
053a24723e63a239bfe888d416882e82
-
SHA1
fe99b710087d85aaa1d7df69484abbe43ea76bbc
-
SHA256
c534bdf0dbce6d4ae61450892f0210419cccc8285cab1c42bacd01077d394b62
-
SHA512
71f52fc455770af59ae1b67bc706de9a6de3c4ac438f3300fc962d6a1b06bc28473215f112c99ad6d7a8edc4d3d0b522a043cc01669cff78af106abf08f1a8e1
-
SSDEEP
12288:Lx9xR5AITvJYjXaiUp/BrUpk6MCFRRRCvfQbxJiEbV2M9iOhB290oCdWEK:Lx9xDAqvJ0Xc/+kPfQ1JhgMThBc0n
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTeslaV4
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-