General
-
Target
PURCHASE ORDER.exe
-
Size
879KB
-
Sample
231201-p724wsaa26
-
MD5
1d32c0bd2f5880c46baaafb8a72ae59d
-
SHA1
be52896b2edf759a459d0775da0e6b9bb2831c49
-
SHA256
bcb3dc574b107728602528604786d687a262ecfb7748b9ff36f09fd893b85c7b
-
SHA512
8285297f5a40bd1aa551061546841dc8bfed8378991c2c2fbc4f39dc2e057534d2b6b273d5ae75ace3a09911f2ce30742980781808d717b6ffe4891c5bfb1f22
-
SSDEEP
12288:HcdIx751cYm9GU13uu8XVJ3hJxlxotCJf/Bn3hj+tOm/DZ:Hc8513m80uui7fxyCJ3BnV+tJ/DZ
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sarahfoils.com - Port:
587 - Username:
[email protected] - Password:
Scalatica01 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.sarahfoils.com - Port:
587 - Username:
[email protected] - Password:
Scalatica01
Targets
-
-
Target
PURCHASE ORDER.exe
-
Size
879KB
-
MD5
1d32c0bd2f5880c46baaafb8a72ae59d
-
SHA1
be52896b2edf759a459d0775da0e6b9bb2831c49
-
SHA256
bcb3dc574b107728602528604786d687a262ecfb7748b9ff36f09fd893b85c7b
-
SHA512
8285297f5a40bd1aa551061546841dc8bfed8378991c2c2fbc4f39dc2e057534d2b6b273d5ae75ace3a09911f2ce30742980781808d717b6ffe4891c5bfb1f22
-
SSDEEP
12288:HcdIx751cYm9GU13uu8XVJ3hJxlxotCJf/Bn3hj+tOm/DZ:Hc8513m80uui7fxyCJ3BnV+tJ/DZ
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-