General
-
Target
fa8061ff7d9857617e9099661f81b31a35ac216c05aebe8b5d44c13a15154097
-
Size
74KB
-
Sample
231212-csb8psdcfn
-
MD5
2a5d0aa84186924f2182c3af6f7e7750
-
SHA1
5e6b9d71f07770167d4792caa002be40c126777f
-
SHA256
fa8061ff7d9857617e9099661f81b31a35ac216c05aebe8b5d44c13a15154097
-
SHA512
fc9a91559aa56ae263f49e440ff59911c6833e7d3b62c4beeec3f31c66bc47d92dc59c921366abe20d9e807a505a3a84d81e26bb9f57c35fb5ad830ab23f3a7d
-
SSDEEP
384:w75dqurNFZ3I+F52Bjh7gmkODaglshmJuSxFv5JQzKoX9u:w7Hj5L9Mh7gvhmJPTJQzKy9u
Static task
static1
Behavioral task
behavioral1
Sample
NEWPO_AH02111122023_pdf.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
NEWPO_AH02111122023_pdf.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.jaazgroup.com - Port:
587 - Username:
[email protected] - Password:
cincin/123
Extracted
agenttesla
Protocol: smtp- Host:
mail.jaazgroup.com - Port:
587 - Username:
[email protected] - Password:
cincin/123 - Email To:
[email protected]
Targets
-
-
Target
NEWPO_AH02111122023_pdf.exe
-
Size
23KB
-
MD5
2fb49f8666cd78b0ccc746c97c2d76d2
-
SHA1
72b378efc36eba9d1b444ce7a2f7bcb9794c2f0e
-
SHA256
6847ce75c0375d36e337e422751753c4b7ff87fb6d2c00d5ef59911427f89d0d
-
SHA512
2109820c70352b000bdf1487947540cc4362a5f531a22d04dee7d7aefddce441dbfb882662ef2059e50a5b5671b3b8bbadbaa9f8df51eba38dbe7168b446eec3
-
SSDEEP
384:s75dqurNFZ3I+F52Bjh7gmkODaglshmJuSxFv5JQzKoX9u:s7Hj5L9Mh7gvhmJPTJQzKy9u
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-