General
-
Target
c2530bd0dfc05cf316f3ec108fc0a384eb8e72f40bc8142c3fcdb92a9d251946
-
Size
1.2MB
-
Sample
220208-bhgj1abean
-
MD5
ea5b92d980b8d65fbac061e3330bf9b5
-
SHA1
5393d177115e95a6151a19852ba4d67b984260b1
-
SHA256
c2530bd0dfc05cf316f3ec108fc0a384eb8e72f40bc8142c3fcdb92a9d251946
-
SHA512
360952075bced1b434b8c4a63932244b5e0f2e3aa3327fe31028464023aa3c05555f7769e9a72807a8b6eabba2c3ea7fe720b55ed8fd2d4cfc2b41e385344d82
Static task
static1
Behavioral task
behavioral1
Sample
Orders.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Orders.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
MARYolanmauluogwo@ever
Targets
-
-
Target
Orders.exe
-
Size
1.6MB
-
MD5
e85daf3a43f107b213310a53bfd35aa9
-
SHA1
042208c7a232b806c6382e34417f9c8e2a955747
-
SHA256
0b1fbc81d9d9e685307e80d20afe4b01c6538b903b77136b0d1db2486fe8c6e8
-
SHA512
29688e0fe124802b3317355e9836864147e56f6e1d47f702f88ea36df813f0eb388818ead042c4463619e17bd5ec295d4cfc4f0caa2c2dbd90edd22b2277ec7d
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Matiex Main Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
AgentTesla Payload
-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-