Overview
overview
10Static
static
316024396335.zip
windows7-x64
116024396335.zip
windows10-2004-x64
1d57d6ee71d...a7.msg
windows7-x64
5d57d6ee71d...a7.msg
windows10-2004-x64
3shipping d...ts.zip
windows7-x64
1shipping d...ts.zip
windows10-2004-x64
1FILE072024.exe
windows7-x64
10FILE072024.exe
windows10-2004-x64
10General
-
Target
16024396335.zip
-
Size
269KB
-
Sample
240315-lswf1sfd93
-
MD5
93ae26b5d0dfaf2b73404e7e0421280a
-
SHA1
b7e482ad7d42f5827729d25f35ad3aea1e505bc3
-
SHA256
ebb087cd8eda272ea47f667d231e6d3ac97b76d089916dbe881a1cf5b50791d6
-
SHA512
cae043fbc4a09f129153f297d34091d597d42f352c08018e2a560b3d30f851f87b05dc06ff7cc5811763d6efc92fc1f6bcd719aafbadb2715b51cfca45ffb829
-
SSDEEP
6144:B//XS+1MaEoVo9h7DAiNhlqnRpBgeH6uk5wuE6iQou2FhrPqZiEOUT:1anhNlNhlqR6xRWQou2repXT
Static task
static1
Behavioral task
behavioral1
Sample
16024396335.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16024396335.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
d57d6ee71d3e0a161bdadd309300d5e7d1129af61886889a8b197addea8617a7.msg
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
d57d6ee71d3e0a161bdadd309300d5e7d1129af61886889a8b197addea8617a7.msg
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
shipping documents.zip
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
shipping documents.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
FILE072024.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
FILE072024.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.fis-uae.com.ng - Port:
587 - Username:
[email protected] - Password:
Big2024maxxymaxx2024 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.fis-uae.com.ng - Port:
587 - Username:
[email protected] - Password:
Big2024maxxymaxx2024
Targets
-
-
Target
16024396335.zip
-
Size
269KB
-
MD5
93ae26b5d0dfaf2b73404e7e0421280a
-
SHA1
b7e482ad7d42f5827729d25f35ad3aea1e505bc3
-
SHA256
ebb087cd8eda272ea47f667d231e6d3ac97b76d089916dbe881a1cf5b50791d6
-
SHA512
cae043fbc4a09f129153f297d34091d597d42f352c08018e2a560b3d30f851f87b05dc06ff7cc5811763d6efc92fc1f6bcd719aafbadb2715b51cfca45ffb829
-
SSDEEP
6144:B//XS+1MaEoVo9h7DAiNhlqnRpBgeH6uk5wuE6iQou2FhrPqZiEOUT:1anhNlNhlqR6xRWQou2repXT
Score1/10 -
-
-
Target
d57d6ee71d3e0a161bdadd309300d5e7d1129af61886889a8b197addea8617a7
-
Size
291KB
-
MD5
d26ec10d5be6b25f879fc0c9f91d65b5
-
SHA1
230049e849f93203c35f581e662181cf583379fe
-
SHA256
d57d6ee71d3e0a161bdadd309300d5e7d1129af61886889a8b197addea8617a7
-
SHA512
6522638195072c233468f12ff32753ae9737a919b7d90f131c5d2063ee74273c489c77190a733d69670edad72a7fc1195c01915cbc7d43374452cf40df684a36
-
SSDEEP
6144:fuTFsSgr/bMXZbqx2ulmOgyeNuw3VXgF6kXRYncUg+4SnbF4:mThGbMX9W2ulmOIZg6kBQESnC
Score5/10-
Drops file in System32 directory
-
-
-
Target
shipping documents.zip
-
Size
254KB
-
MD5
a536d6ba24600779227241e0022249cc
-
SHA1
edde9111494e80a13e95471ae03e524108a65a0a
-
SHA256
d1ec6657e32505edc59ca8705a506c7fda91b6b8b19e1f8802db573f5b268ffe
-
SHA512
80540a2e696b8f9718c40d16c37bec0da5c5513ba7697e7fbeb2fe340d0baa548c90bac8fcded91c7dddeaadbdc53d78bcb658aee70c396692aeb1879436f54c
-
SSDEEP
6144:9Sgr/bMXZbqx2ulmOgyeNuw3VXgF6kXRYncUg+4SnbF4L:YGbMX9W2ulmOIZg6kBQESnCL
Score1/10 -
-
-
Target
FILE072024.exe
-
Size
340KB
-
MD5
b9f9bcdea392c69e0ae52b21249ebae7
-
SHA1
e53b2226e99553057457c0cbb00a6228e47239fb
-
SHA256
db8e59274891184242f029e9db38f965c7aebcc50c65d6899568a48c36098166
-
SHA512
3ff8ae35e966a1ba2eec719983f80ed067c6e242fe12e12b04b087fec91c3631af77015632c4411ba106832ef9101654247062a0be603d9f70905c40c1295ecd
-
SSDEEP
6144:gOXzo08c9RvPIYz/7bPYTUcw4dg0UZ6dLeqWoG2JK1rSZTRJ8zQdS+WO28:PoaRvh7+Ucw42fZ6dCDzgEyRJsR+i8
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-