General
-
Target
f451e3fc2b1d1eb891fa6501bd3a38a0727c851d0c613360469e300b56dfeec3
-
Size
812KB
-
Sample
240930-cm81gswhqg
-
MD5
41408cf22856931332f0fea0fc212520
-
SHA1
fd976cb9cd9a2f4a9f3aae8488f7d5eac898399a
-
SHA256
f451e3fc2b1d1eb891fa6501bd3a38a0727c851d0c613360469e300b56dfeec3
-
SHA512
9a1f42301ba2e8de59ea8e2f87577ec4a960c5341e62527391a89e682258d059e2e695834baa131b13fae750ba2d0e9b1e51bbbc23d4b5677b9d4744336c0cab
-
SSDEEP
24576:ZEwNrLI9DrDiwcxkqhPFbifPQG/FOlOM17rWZ7co6:ZEoLmDrDdZ2PIfPf/FIgZ74
Static task
static1
Behavioral task
behavioral1
Sample
Kruger Order List.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Kruger Order List.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.agaliofu.top - Port:
587 - Username:
[email protected] - Password:
QPS.6YYl.Yi= - Email To:
[email protected]
Targets
-
-
Target
Kruger Order List.exe
-
Size
1.2MB
-
MD5
17bb63867aba0564b14df72fb99bc3c0
-
SHA1
77119a6734bc592ba19ed83749086c623c559f1f
-
SHA256
c29ad8b7cf8d2a3bbd93546f4778ec11ff8401a94574806db0479dd79033c55e
-
SHA512
e49aab5f57625423877e009f66c5d77959db63a17a03d79f7363195fbc81cd1b5bea20704c17608f52e1e25e61039ad8616ce66e2ed229f71a108634e2a63f9a
-
SSDEEP
24576:rfmMv6Ckr7Mny5QUDNxldjFQBF3WYF4rT+xRnh:r3v+7/5QUDzldjF00YFET+xRh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-