General
-
Target
PO OAU_DECQTRFA00541·PDF.scr
-
Size
987KB
-
Sample
231211-q3ecpshfa2
-
MD5
0da7bfdc743fed49845150c88f6f47fc
-
SHA1
ccb0d8a5a01b8831260fd63fb73ca98e8108da36
-
SHA256
5afb99657fd9ddae3a21399d562c2e78933122000db26ca208c363d71c938e6b
-
SHA512
e92c4b55c0e538769d4cdd031cd59926076d0b2a13bef52b9c5aa6668401a6de7cd874818f45a49ed22cd2be99a4eac1282fd7946bfa448beb0dd06d85ba0520
-
SSDEEP
12288:4HLRiJkDbp7NIp09j0nWiC8UddYncE/ZVU5Sn74uiou:4HoJYbp7RNvdQcEHn7t5u
Static task
static1
Behavioral task
behavioral1
Sample
PO OAU_DECQTRFA00541·PDF.scr
Resource
win7-20231129-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
uymzbwhxnsbuprue - Email To:
[email protected]
Targets
-
-
Target
PO OAU_DECQTRFA00541·PDF.scr
-
Size
987KB
-
MD5
0da7bfdc743fed49845150c88f6f47fc
-
SHA1
ccb0d8a5a01b8831260fd63fb73ca98e8108da36
-
SHA256
5afb99657fd9ddae3a21399d562c2e78933122000db26ca208c363d71c938e6b
-
SHA512
e92c4b55c0e538769d4cdd031cd59926076d0b2a13bef52b9c5aa6668401a6de7cd874818f45a49ed22cd2be99a4eac1282fd7946bfa448beb0dd06d85ba0520
-
SSDEEP
12288:4HLRiJkDbp7NIp09j0nWiC8UddYncE/ZVU5Sn74uiou:4HoJYbp7RNvdQcEHn7t5u
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Suspicious use of SetThreadContext
-