General
-
Target
71774a5867e98b3b4943fffc9fa1db38b6da914b85de055ad7f016a5f3c21655
-
Size
816KB
-
Sample
220521-ne474sggbk
-
MD5
7ca5c77480e108ae1fee73bf0c0e5932
-
SHA1
800a973eac2866505c9952104471a65c47cd9eac
-
SHA256
71774a5867e98b3b4943fffc9fa1db38b6da914b85de055ad7f016a5f3c21655
-
SHA512
077c395466adc645736a41138a879986dcc831fa9fcd537e9853dcd360c743a9207984bf2fb8a61f91af5bb9ac4d6b444c7500b84a2e0905a2e93ae8eb9ac709
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.a-k.co.ir - Port:
587 - Username:
info@a-k.co.ir - Password:
09133434194
Targets
-
-
Target
PURCHASE ORDER.exe
-
Size
925KB
-
MD5
00cb6b37f49d97ea18d520e7a9ef0267
-
SHA1
48801823d7d98ab5bd4bdac6d7c66d81cd22bdae
-
SHA256
ddc748730801ad92b2c03a494933ad11a64c4644cfc3d155d227746b373a0215
-
SHA512
3b9c3eb55b8940ce1413c81aeece5c3d592dd970934ca532b92a1e3019af82ce61b86f523651d2384a95887362a598b28cf919b602f45bf0b49518283c7e7344
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-