General
-
Target
d3d5c8dccab0189ae7e455ff52fd870d3fc9e7b0b3dbebeae8f8497dfd695a74
-
Size
621KB
-
Sample
231211-m45z9sebg9
-
MD5
df2c1a614593c7b5eb974b807e3a0208
-
SHA1
fc0b4388d4da4398c86bf87bebc573e87a1a986a
-
SHA256
d3d5c8dccab0189ae7e455ff52fd870d3fc9e7b0b3dbebeae8f8497dfd695a74
-
SHA512
88fac28dc600767209b3db21e7141701ee2d4470400dc066ac738cca4673721beb6a57ec7eacb0daf62c2c05f3457f514647af29da436b54132d7a048a0835d9
-
SSDEEP
12288:x4dFJ4amO8QxEG/yCYSTom0gafmpGL/ZWtyxNESr3k4UXsl:wGrQCCY407L/EtyxNESrDUXsl
Static task
static1
Behavioral task
behavioral1
Sample
PO OAU_DECQTRFA00541·PDF.scr
Resource
win7-20231025-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
ilkbisbtwjcrlqtd - Email To:
[email protected]
Targets
-
-
Target
PO OAU_DECQTRFA00541·PDF.scr
-
Size
985KB
-
MD5
111317166b36b912115a088ebcdacbbe
-
SHA1
839c631b48ade41e44476c474e16d17a2c9f3973
-
SHA256
21bef58cf084c50303e71db19d94deda6e858387718ed29459a80ffa4f6aa2cb
-
SHA512
4491a6a69b669643fbd1e4992ff83dbf136796fd4d301e2d0d95ae371f9e55e881e830a69f9f0c9278cbfccc58b95251d067c8441a9caa6e13fad7c563f2ea3e
-
SSDEEP
12288:E6ZCUU8aTj+Ak0rdgjycrGzpMWG4F1wXCDKJGmMZN14n+1OV2CPAY:i6an+ABxoycrGdV3F+XrJGHN14+QhIY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-