General
-
Target
PURCHASE ORDER.exe
-
Size
483KB
-
Sample
211022-3fd5msdagq
-
MD5
6b2a61536797c25fadf61b9e118a9764
-
SHA1
cef336921af96c09cfb04b2992ca43354c78ec9d
-
SHA256
bcaa7a736371d8db89c5ae663c529635632e86d02273e430997a6373e8f8788e
-
SHA512
2cc99c1372e6610aad7be337aee127316733f4ad5fb495bc79362aa8cb3fcb5f6cb644abe26afc2bead6653c92faa2b8683a9e9aa1d8358c11fbf34604ae862e
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
PURCHASE ORDER.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aldhiyafainteriors.com - Port:
587 - Username:
rahman@aldhiyafainteriors.com - Password:
dhiyafa@987
Targets
-
-
Target
PURCHASE ORDER.exe
-
Size
483KB
-
MD5
6b2a61536797c25fadf61b9e118a9764
-
SHA1
cef336921af96c09cfb04b2992ca43354c78ec9d
-
SHA256
bcaa7a736371d8db89c5ae663c529635632e86d02273e430997a6373e8f8788e
-
SHA512
2cc99c1372e6610aad7be337aee127316733f4ad5fb495bc79362aa8cb3fcb5f6cb644abe26afc2bead6653c92faa2b8683a9e9aa1d8358c11fbf34604ae862e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-