General
-
Target
e0ed9ae4533a2a960d0015130b0265f6f93f437c63abaa6a0bb974a5d1cb4b69.jar
-
Size
372KB
-
Sample
240517-cf8q5scf38
-
MD5
c161c3cee8b281c3c6019aa13b4653ae
-
SHA1
62a04e9351c8ccf57bd6dee365f8c1059e56bc6e
-
SHA256
e0ed9ae4533a2a960d0015130b0265f6f93f437c63abaa6a0bb974a5d1cb4b69
-
SHA512
143cfec723849c7edd7e9ad57be8ee67b5d9a6b815a169c6c8daeb642e5d0b63925d4a1ce76925050bf7ac0f4f8afd36e6c790a2b05e1a50df1cb9f1f0d2e1d8
-
SSDEEP
6144:xerlMyR7NAdpBNQZBMgEJvZoIhxEL+bBeUyCzV/1b8+ryclllGQqdeg3Lw4:oqyhNoHQQJxBXlbBe0zV/1btvkJ0g3X
Static task
static1
Behavioral task
behavioral1
Sample
Order Inquiry for new Purchase_pdf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Order Inquiry for new Purchase_pdf.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6921829812:AAEnJSJNfX1IyXT3BfHBFaRrW9XkEjVZMFs/
Targets
-
-
Target
Order Inquiry for new Purchase_pdf.exe
-
Size
947KB
-
MD5
12a0d4a27fb7f7d5f1b345c9e6b171e2
-
SHA1
6c6c01b4d9023e2f77ea6758b935c656637e5ea2
-
SHA256
fc44d6c0bc3f20d6e311cbc63e3442fb7f31b2edf039e49ce424549eddfa522d
-
SHA512
1916f25fd5dca34c3c92c97a0a5ccd9663d1bdce3d00ee23fd5c1dcdc91784fcdba8fb4857c0478f95920f0c9bbe9e422effa2163e724af4343f6c7ae6dd4418
-
SSDEEP
24576:OeqkD+B877zBtMA0yZqv+D09Pxjlahm8QIPntPG1kYWAXPJ:OeX+xjz8HzYW
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables packed with 9Rays.Net Spices.Net Obfuscator.
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-