General
-
Target
6f3570636cf23152e05747048cf8d8fd
-
Size
769KB
-
Sample
231226-pv9yzacefk
-
MD5
6f3570636cf23152e05747048cf8d8fd
-
SHA1
5496e0b56f426ca83ba68c831f4e2103317217c9
-
SHA256
b0db665ee10001c98ba8fb94048fc94d17474115b1db146b081c8c82ad1a0aac
-
SHA512
1ce24b7d328bad461557c08819cc84ce1c16cc3d725e4cf38d95d7228684920359f744b169a5fdf16a9eaa1aa714f5a956e58c9407b6846b7411e32f6798a58d
-
SSDEEP
12288:O4YnvvSEqAyrbx/P3vkRKpVlr29uoYMhlbryIYqwhq1xxiernXQgf3T:ORirlERwmA/MhVryIYCVvfT
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Purchase order.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.vivaldi.net - Port:
587 - Username:
[email protected] - Password:
goodgood12345
Targets
-
-
Target
Purchase order.exe
-
Size
913KB
-
MD5
dc50bc5cab0728f5072e4e944d82c1ce
-
SHA1
382619df4c0e7bff056cfd3a551d8f4b463a13b7
-
SHA256
a9ba588dc9da50b3d3a7c78a42d3734d3336de3e3cabed9db41bbc742520b204
-
SHA512
87b5a273b7080f9dc926a48fc90e880b1b37dcf086b07c145adafd3f69bf111870009812334ecd08ebb857ba2c83669f731f32492a3c35a7ac0feadbb839ee58
-
SSDEEP
24576:crhqbidgrQM9em4Rz8EAtQELfZ+f0tMcGk37eyko:oPQQM934Rz5aQCfcS6kCyk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-