General
-
Target
af9207ab37fb87c6cce4555a08cffcfab37d7b6dc0caa5d04a95c13d83c4f633
-
Size
376KB
-
Sample
220520-2wrv1abahr
-
MD5
0e5eb893c114fb3c79f2870167ad7b1f
-
SHA1
0bf547321803387887a49f6d1502bc97b71b8568
-
SHA256
af9207ab37fb87c6cce4555a08cffcfab37d7b6dc0caa5d04a95c13d83c4f633
-
SHA512
499a343a5d632265568bb546b03a5c033d901f6a597fa1bc0c3327468af844e1dbebfdd89d3441fd3282652bbe240f58d6e0cb56317d2c37584b66bffce67d8f
Static task
static1
Behavioral task
behavioral1
Sample
New_Order2020.07.03.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
New_Order2020.07.03.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.itdone.cz - Port:
587 - Username:
[email protected] - Password:
viObavejMa
Extracted
Protocol: smtp- Host:
mail.itdone.cz - Port:
587 - Username:
[email protected] - Password:
viObavejMa
Targets
-
-
Target
New_Order2020.07.03.exe
-
Size
486KB
-
MD5
3f718a931a96049d60f8a4055d15235c
-
SHA1
6c1ccc7510545b90974e945949569c6fd3167007
-
SHA256
5b3b2cedb97bc0b3e2e011bd59cab0e5be8b6d08824e64476ff2744ec8c7e6ff
-
SHA512
debc7202edd8240e8c8990aa6b0f64aa73c1466a810d79eac18a6d15e1ba6d86b8220c567fd856bbd304c68f899f0c672d261b014d7efb955f353e88022d0a52
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-