General
-
Target
new order 4504333579_1.zip
-
Size
30KB
-
Sample
250113-qqnevawkgk
-
MD5
eb127200d9f227affb6bf46bd3950306
-
SHA1
6d6afbd2ef43d770742b0ee5fbe44c17ef589c05
-
SHA256
c22e1fcf871af7ca2d0906e6c0f15a0043a5a263475ae4beddf0a8984871a754
-
SHA512
499ebb90b099bf9f7cf2552e2c69874b6537b94aa84ec18b2eb57bd54874ade2e5cf50259314ef6318bed1401a126f36a9d2cd6613de140aebec4261be8611a0
-
SSDEEP
768:YQJqo86Asq6cLdMEuptBZd4GF2x6xKzpzEICLTZNFefc0yRofYdj:Y0qoRY7updez6wlEICffFefEyYj
Static task
static1
Behavioral task
behavioral1
Sample
new order 4504333579.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Targets
-
-
Target
new order 4504333579.com
-
Size
67KB
-
MD5
36ae28620e7244b3a156dba6ff89a8f0
-
SHA1
bb31a9865a529075e7ec0addfa96e5f71e2049a0
-
SHA256
27176b90fbe01af0c55c519bf0132245b8102cee3eed98d2ff8bc259e0313142
-
SHA512
6c6abb7bc0db8ff6b9011b2c1e508fd55c03784c16ba5cc929738f39833ff506d9fc6b56f7f13199d017dc04d9c164275304e1b3910c70dbf95caf3b2ecf8f46
-
SSDEEP
1536:nv7a6wXjugRKE5xgVxTJAXoEROZPmAo2+P9KqWITSdn:voTBME58xTCXjROZPmA/WKjI6n
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Suspicious use of SetThreadContext
-