General
-
Target
ec070235f19d91005e783a1d289c3db23a73b6310bf576dbbb9db0e5946b2b50
-
Size
693KB
-
Sample
241213-bp3qtawjcr
-
MD5
b0e3418f90df8f2e49f3e8cd07ff55a3
-
SHA1
88a76a1dfe28029457c61e54fd0ba5de2f84c469
-
SHA256
ec070235f19d91005e783a1d289c3db23a73b6310bf576dbbb9db0e5946b2b50
-
SHA512
68a0dabeeab102b1b01c763fd9cbdb44983b8dc23182ee8d6bbdcd9c5f6a837767b1c13d146e685aff6330f96613b15db1308fdc4e61175197c91ed6b9c2b052
-
SSDEEP
12288:x8kmIIX0UautsMxhmGQ96tlytR3eXK/eAAwNb19UFetRIODd5caqX/Axgpc:qprX0UautsMxgGi6tgv/eApb0FeTIOYm
Static task
static1
Behavioral task
behavioral1
Sample
Payment Receipt GO23B005XXXX024.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payment Receipt GO23B005XXXX024.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Payment Receipt GO23B005XXXX024.exe
-
Size
1.1MB
-
MD5
eb825525a859ea9849df1e834b1ad616
-
SHA1
2ac5df9260b61026d830ee922d673454addf4874
-
SHA256
706a82f9a21ca0e5a2c87de18ce323764eeb489737c9c165f89ce4745b946053
-
SHA512
458782549f5a7ab96e87155afa642ee423fc09c07641d8d9409ccffcf6d7e5fb6213e6b3077cfb5bbef4f55eaf9f87b63bea226509f2a193b725e00e9470ee15
-
SSDEEP
24576:4u6J33O0c+JY5UZ+XC0kGso6FaAXUbzkhHVErGrWY:yu0c++OCvkGs9FaAEfkhyY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-