General
-
Target
9ffd774ffa639b926288eab6adafd991d3878fe58b5b17f27c76ed74c0f3ea96
-
Size
473KB
-
Sample
220521-abqnnacgfp
-
MD5
38ed19d73af4f08795c9c6e10ab4b761
-
SHA1
d764a84a3a80cbb58e2982c90c0398e49ca6699c
-
SHA256
9ffd774ffa639b926288eab6adafd991d3878fe58b5b17f27c76ed74c0f3ea96
-
SHA512
9871a6ea4bd4e13746adde71fad223dcc0dd6e93790e4784ede7f6a7fe88d4a47a79c00e5433a2048523585012619c24962f4ac185f01d7d183a58b2b37afb3b
Static task
static1
Behavioral task
behavioral1
Sample
FIRST PURCHASE ORDER.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
FIRST PURCHASE ORDER.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aquariuslogistics.com - Port:
587 - Username:
[email protected] - Password:
AQL@2019#$
Targets
-
-
Target
FIRST PURCHASE ORDER.exe
-
Size
733KB
-
MD5
7049a8a60d535e335ad3ba4f32ac5b14
-
SHA1
a41c7239026a2820c2e79fa2b3e9e29194517c17
-
SHA256
40a33fa7eeec1caf0ee27f87a4c3d8fd8f1475789191a1693329e2fa154b02a2
-
SHA512
9755c2f86e208fdf9a6440cd2d1ad8c41e84425d55894d85a03b867c4a7a4ee76f7dfeee08881a1c2ea57ac1f64d1561db268be13349524d63b9cf5a72d8aec0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-