General
-
Target
Order.exe
-
Size
619KB
-
Sample
231212-jawb7aghem
-
MD5
13f46c752ce885f02f8510f6e8394d09
-
SHA1
f8c75bd94743b65a0357c7c4624935dde995516c
-
SHA256
62ac966bbf9e18043009d186e0dca05437c730f4ecdde53929ce2094aad1f14c
-
SHA512
196b0cbe22c7d565780ec678eed55b171d57a3636340014bca6aea4d35daa77771ffdaca262dac683c8bfdfefaf733b6f10856ab294eefec3a0b77b5fad1ee07
-
SSDEEP
12288:+3IU8S6eUdFb0/G+LfuT2Y8rcTBbphMIXgHsxAX+kiDM:UItSAdFg/G+Lfu2Y3BV1tD
Static task
static1
Behavioral task
behavioral1
Sample
Order.exe
Resource
win7-20231020-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dayanbiotech.ir - Port:
587 - Username:
[email protected] - Password:
Amir49758 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.dayanbiotech.ir - Port:
587 - Username:
[email protected] - Password:
Amir49758
Targets
-
-
Target
Order.exe
-
Size
619KB
-
MD5
13f46c752ce885f02f8510f6e8394d09
-
SHA1
f8c75bd94743b65a0357c7c4624935dde995516c
-
SHA256
62ac966bbf9e18043009d186e0dca05437c730f4ecdde53929ce2094aad1f14c
-
SHA512
196b0cbe22c7d565780ec678eed55b171d57a3636340014bca6aea4d35daa77771ffdaca262dac683c8bfdfefaf733b6f10856ab294eefec3a0b77b5fad1ee07
-
SSDEEP
12288:+3IU8S6eUdFb0/G+LfuT2Y8rcTBbphMIXgHsxAX+kiDM:UItSAdFg/G+Lfu2Y3BV1tD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Suspicious use of SetThreadContext
-