General
-
Target
PURCHASE ORDER #298767649DF.zip
-
Size
467KB
-
Sample
211202-p4ymasbfc2
-
MD5
469252eea99df45b47affd6bda988680
-
SHA1
eb4654b44648486f6371e78e31b9d22896936976
-
SHA256
02132c8324f6c92f14c3253686a71a21197dfa7cfb8a9263196019e49adb84ac
-
SHA512
191e2a990bc019289ad77c2f73695cba825c686512a9808c0ee7cb8e04ac708e851d683cd4b023c30c95df94a78700b717aa32549a360e388e18d1337b720726
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER #298767649DF.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
PURCHASE ORDER #298767649DF.exe
Resource
win10-en-20211104
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dieseltronic.com.pe - Port:
587 - Username:
[email protected] - Password:
Asdiesel2019@?%%%,
Targets
-
-
Target
PURCHASE ORDER #298767649DF.exe
-
Size
571KB
-
MD5
38b5e64b40b7385e941853fafcca52ed
-
SHA1
3500d74b58a12151a541865eb72e54dc97553a8f
-
SHA256
0a15fc96322463009c95cafcf720acb2eb9dbee7baffbd1131532891db885a6e
-
SHA512
33b99a75e63d5d4497ef6a85e2a9f6cd3248a1110acec2864457b300194acdd582d9da6e932d9abca9265613495bbc753777066d4181462aef08862b89f96d6a
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-