General
-
Target
715c87ffb0854681c7cc37d4f5914871
-
Size
901KB
-
Sample
240124-ea8v3ahfgj
-
MD5
715c87ffb0854681c7cc37d4f5914871
-
SHA1
27c63eabf989f5996e7b9f5c8d560c95ce9db7a7
-
SHA256
06c41ac3b1c9c2913aacf32ba3c4f21b0182b36db66b6e4d07e0ed610f98cfb6
-
SHA512
d94e6c02c765cee9f0a4166cf0e390858c5ac8977fd015697f01627e55193e89cb84dd515cf19e58eb0bba4c9063d4b9987b53afca3aa2298751fcc183371cd1
-
SSDEEP
24576:Z3G955hqKA48lpC17W7ry5zCf4NttomzxVL9Wycjq:khy3lfHwzC03FzxVhrcjq
Static task
static1
Behavioral task
behavioral1
Sample
Products Order.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Products Order.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.scottbyscott.com - Port:
587 - Username:
[email protected] - Password:
ngozi8989 - Email To:
[email protected]
Targets
-
-
Target
Products Order.exe
-
Size
1.4MB
-
MD5
e3c42f4fa46290ac448c8e8581234ea1
-
SHA1
27b2b99a10a8464ffee81834f9c6be73bf7c9e38
-
SHA256
f98808e82b9b3bea09748af3e904eb9cc769dd6f2378c4baa19d4f0c963634b2
-
SHA512
3b627fc313b2003ffd095ba64114dba5fcaecb30c97ea4a63286f2bd8aa1d8e2fc1cd9465d0e7ff334c91147a37fb19d1fa62b604baf349ba9b0de756baae18a
-
SSDEEP
24576:8TK+2a6Zefx8DgMfx8DgEsijrre0UbP93GqIttSe96jur0I1AwZCfLL:+25c58DgM58Dg0z+JetSD64I1PZCj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-