General
-
Target
e1000ad80b309ef5f3e84a8c10a034f0b073d84c9c8ef0b499d5abcef16e9818
-
Size
772KB
-
Sample
241001-jm137sybqk
-
MD5
7da405020d545b42f13fb3101b834154
-
SHA1
d174eb0d88ce5b5ff760a7c595538156c497c9e2
-
SHA256
e1000ad80b309ef5f3e84a8c10a034f0b073d84c9c8ef0b499d5abcef16e9818
-
SHA512
1955e4dd3a8f538eb6095e23c466724c1943100005711e5d3759beec23713946d9ef14108649d4094b50d72a163b6567932d8169c61f83f1405bec4984c022c2
-
SSDEEP
24576:8EwNrLI9DrDipUzlbRyHzurRYdj2w9J2IUq7QN/wNJ:8EoLmDrDZlbEz2RYdj2m7QN/2J
Static task
static1
Behavioral task
behavioral1
Sample
UKRAINE ORDER.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
UKRAINE ORDER.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.agaliofu.top - Port:
587 - Username:
[email protected] - Password:
QPS.6YYl.Yi= - Email To:
[email protected]
Targets
-
-
Target
UKRAINE ORDER.exe
-
Size
1.1MB
-
MD5
be568e9ada4c30192e3c7cd70832c0fe
-
SHA1
3a968539500ff66264094a1b3602ff968f0ea5e3
-
SHA256
4e6003b77cd84ef993df8a6d25b84af2ea485ec61c501b77dde3891ecf2ca2a5
-
SHA512
4f371de0f5acbb2996df2d7647a256b34ca2079a96cc81fc8610c87edc450b5c17776eb5b673aceca20b9e091f6df2c578bae63c124f4611bf1e223e1cac9a2b
-
SSDEEP
24576:rfmMv6Ckr7Mny5QUDNxl3J3fgORq3Xbmb7R4k6YUzL:r3v+7/5QUDzl94Oem+k+zL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-