General
-
Target
payment receipt.exe
-
Size
918KB
-
Sample
231211-s2wlpscbf4
-
MD5
0267124a0f286b43897b99dea1f3b0ea
-
SHA1
dcc8590b8fc2adfecb01c919f80f4a0d30c123b4
-
SHA256
4a5c1ecaabfa1e8421a4a975593f1563f5170f538daa982ea2050e902bd7dd28
-
SHA512
72f5908456d73f3a180db5c2dc869043130b7af35be918131fa72ada0b969c9d3cbf90754d0700bb1864ba0714f1d3e800272bb8f0d6e5d52192a7e33a2b23aa
-
SSDEEP
12288:R3IU8S6eUddsV08lxM1lXjfZBU+wfiFWXO68KVJtG90oGw+48MbcmXS:JItSAdWU2ZfiUT8WS0oGb48SPi
Static task
static1
Behavioral task
behavioral1
Sample
payment receipt.exe
Resource
win7-20231130-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1181894413438439434/9bOHVO843L8CrAC0uc2nEWNawAnthabqbd_3QLkg4EwlDdJ0KycDbG1rrLXUyDx--pB7
Targets
-
-
Target
payment receipt.exe
-
Size
918KB
-
MD5
0267124a0f286b43897b99dea1f3b0ea
-
SHA1
dcc8590b8fc2adfecb01c919f80f4a0d30c123b4
-
SHA256
4a5c1ecaabfa1e8421a4a975593f1563f5170f538daa982ea2050e902bd7dd28
-
SHA512
72f5908456d73f3a180db5c2dc869043130b7af35be918131fa72ada0b969c9d3cbf90754d0700bb1864ba0714f1d3e800272bb8f0d6e5d52192a7e33a2b23aa
-
SSDEEP
12288:R3IU8S6eUddsV08lxM1lXjfZBU+wfiFWXO68KVJtG90oGw+48MbcmXS:JItSAdWU2ZfiUT8WS0oGb48SPi
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-