General
-
Target
dbf95d753a2fedbee7a92a7e40dbcd3cdf655a2d6f1a163bf0c3aeefd1e021dc
-
Size
584KB
-
Sample
241211-ahkqzswmbs
-
MD5
91e76e77f8764bf53ddd77db623d72a5
-
SHA1
218fc76540fb2983807caf52525eee60746b84ac
-
SHA256
dbf95d753a2fedbee7a92a7e40dbcd3cdf655a2d6f1a163bf0c3aeefd1e021dc
-
SHA512
ef261991c8dea262fd99e4300d57d9b800bd5a3b6a5c974bb6eeabe436711144e88a16904ce907d672da158932173fa475191c263f92f3a3b2721498b86086a5
-
SSDEEP
12288:6Qdb74Mm86QFpeXwlSs/fBPFRH3LpDDCOueaewd/KX8:Z2ZQrSKPFiOulJKX8
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.skylinemaritime.net - Port:
587 - Username:
[email protected] - Password:
js5C(,jsKG?] - Email To:
[email protected]
Targets
-
-
Target
Purchase Order.exe
-
Size
588KB
-
MD5
55ab87ddf0459b1c207d4590f021e854
-
SHA1
22a3bf9867de027fde4ba06d1e9fd36654a885ce
-
SHA256
10bfbd96b6b11b5c6be3a51ed9b469a5e7d298d311d16f7ccb30624fac5af8c4
-
SHA512
77cbd0efa243ebd7b01995271dcea710524432853e68c1c474138f6b619a2505425ef3b1f20518fc7698866371f366c9fae0e032de55180f56188ab856ead0ee
-
SSDEEP
12288:CumOpyl6zVirdwFghawidFSl1lcegbQx5LPIJ9xxhOBOMkiFjV338O4Od0CgwP8c:nmOQ6zArd8gmdFSlDtg0wJ5QBO/DOdr9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-