General
-
Target
ea6a2787665f06612331c4967148471eba58a718177829627fda731ee9f6605c
-
Size
581KB
-
Sample
220520-16pb7aegb2
-
MD5
4fdf42753e89f0c5c7be93654390f274
-
SHA1
cdd6e5734738e3594ccda486d50c85c15725a858
-
SHA256
ea6a2787665f06612331c4967148471eba58a718177829627fda731ee9f6605c
-
SHA512
01770f96be92ee6aa1ead626d645fe82eba2608d9b5507d37dea66d248607926bcf96a370cc07debd949a6138b38e026419ea969952ad28f48c595eef057b5d4
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER (PO.4029530).exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER (PO.4029530).exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cortlandfire.org - Port:
587 - Username:
[email protected] - Password:
UsMc2336
Extracted
Protocol: smtp- Host:
mail.cortlandfire.org - Port:
587 - Username:
[email protected] - Password:
UsMc2336
Targets
-
-
Target
PURCHASE ORDER (PO.4029530).exe
-
Size
615KB
-
MD5
e080c630c1cff4bf3eed195aaa93b31d
-
SHA1
684f0dc565624af4d944b1d259173d329f4cef84
-
SHA256
aea7319d67789e4e524c4af9bcb842d66593a97dff25cb4be43eee5f5fb86963
-
SHA512
655aaf53d7d6320a42f1b078a62e3c700c2b2ccb5a7babb8898549c1b292152183f752f1d92f2617b6b016889b7b0ce43e6437b49bc5f7c77dd571fda3d17a32
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-