General
-
Target
3fe770efe255e2b7225d6108878f3b5e78dc8b6d90a5d09229b4a42a14f7be24
-
Size
633KB
-
Sample
231201-m59d3shd21
-
MD5
c378e81969c786a983545dd048bf8620
-
SHA1
d107abb6ee9e2537c18e9402478cb2819af48bcd
-
SHA256
3fe770efe255e2b7225d6108878f3b5e78dc8b6d90a5d09229b4a42a14f7be24
-
SHA512
77a245bf1f8de7df370921ec4b84308d5854cb70c487c72c5d8b9b116069ed8fe2373a893dccf01db6341948b55045102c36a4d14f93b22d8f0c4c5afc948a4e
-
SSDEEP
12288:GbNN0vkI6YiC/V1CYI94Umjrr31F3uS8/VJe0hJNw8ZJtE9f1BFJJfoFNLF/:GH00eV1FIKHp1uSAzNwQE99BF3f2D
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sarahfoils.com - Port:
587 - Username:
[email protected] - Password:
Scalatica01 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.sarahfoils.com - Port:
587 - Username:
[email protected] - Password:
Scalatica01
Targets
-
-
Target
PURCHASE ORDER.exe
-
Size
879KB
-
MD5
1d32c0bd2f5880c46baaafb8a72ae59d
-
SHA1
be52896b2edf759a459d0775da0e6b9bb2831c49
-
SHA256
bcb3dc574b107728602528604786d687a262ecfb7748b9ff36f09fd893b85c7b
-
SHA512
8285297f5a40bd1aa551061546841dc8bfed8378991c2c2fbc4f39dc2e057534d2b6b273d5ae75ace3a09911f2ce30742980781808d717b6ffe4891c5bfb1f22
-
SSDEEP
12288:HcdIx751cYm9GU13uu8XVJ3hJxlxotCJf/Bn3hj+tOm/DZ:Hc8513m80uui7fxyCJ3BnV+tJ/DZ
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-