General
-
Target
2ea073ddc357d19912eeb45d967fd80c742a676cf9f00ad8d7ade93be5e4b101
-
Size
1.2MB
-
Sample
220208-dh98escdh7
-
MD5
472d076a50474e002f4bd798eac94876
-
SHA1
4d6f29a4f6a496394156ed800b4dfd6cd952d4f0
-
SHA256
2ea073ddc357d19912eeb45d967fd80c742a676cf9f00ad8d7ade93be5e4b101
-
SHA512
faaa86c4c78d4cd741d41842a09b457489346c32ab8ac5226641d60fc64d10a3d5abe64bff1bc2bd0ebd5b74f12e196f5dc959478fe57fb63d2722ce3591f3cb
Static task
static1
Behavioral task
behavioral1
Sample
PO_Invoices_pdf.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
PO_Invoices_pdf.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
PO_Invoices_pdf.exe
-
Size
1.6MB
-
MD5
59d7d8d5dd3e0055e7c0dcc75897f569
-
SHA1
b249b28d088d54e971e2d9d8b2688440f8e6d513
-
SHA256
ef715cd322f0a805a68840b215c062f2e254977170a11c6800d836eac781fabb
-
SHA512
79ebc2a128d018eb7e71b254fdd2fa72deae18081f1732619046e1db9d1aee92f7529521c005a5f861275afcbda3a39fd304cd5e1a49df848675460c5cf8f30d
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Matiex Main Payload
-
AgentTesla Payload
-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-