General
-
Target
10cb2f45ed329d4e54ae3534fa7c84fae27380f36ce5704e708bd0e1eaa76d7a
-
Size
596KB
-
Sample
240906-y48a6swfmg
-
MD5
ce0a578c0d539a181a644543fa14370d
-
SHA1
dbfe61b26f3157ce1f054ca2c09f3e2fdb013920
-
SHA256
10cb2f45ed329d4e54ae3534fa7c84fae27380f36ce5704e708bd0e1eaa76d7a
-
SHA512
8338f5f9132aff30718217cc4e5c338367006754d3a6463b8de1a502054746cdf3092c32e30627b53a3d6b51babacb1fc1bdc4c01ba714b7dc2666db9a5351fb
-
SSDEEP
12288:L4Fa5ch/Qw72X8cUvJapZcWjAiRhU/StZGnLAPPMfEmovCU3HD:EFa+ZAJU/StmLwPeEmyj
Static task
static1
Behavioral task
behavioral1
Sample
Statement of Account Due - August 31, 2024.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Statement of Account Due - August 31, 2024.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
phoenixblowers.com - Port:
587 - Username:
[email protected] - Password:
Officeback@2022# - Email To:
[email protected]
Targets
-
-
Target
Statement of Account Due - August 31, 2024.exe
-
Size
1019KB
-
MD5
4bb066623fe7f3182d53a21741a4ecc7
-
SHA1
f601da88b55d9a90c8a3cc9a820aec521224e9f9
-
SHA256
d1c91f8b04e4dd8c499ab9c2dfc5a2471fcd783dc09d3f1b0afa98d246f213d8
-
SHA512
eb930fff2d805d06028daa320afb854682bb53b1af8ee0c533d14733bdca8c62d2e113b1f84fbdfcc826218ab7400b53ab2ad22ebfe109c2c8a9701f5a98608a
-
SSDEEP
24576:9AHnh+eWsN3skA4RV1Hom2KXMmHaBYt8BwH+YWRN5:ch+ZkldoPK8YaBYtT8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-