General
-
Target
NEW ORDER.rar
-
Size
556KB
-
Sample
220918-jzd47seghj
-
MD5
dcb0b0d62aa51cbe4005a757ba7ea673
-
SHA1
d0fef1653498b6d26b3942e02070bfdced6f4ef1
-
SHA256
06b401062b572b2b452e6df88660c0bd437aa668c3d40cae18f627400a259689
-
SHA512
352a4873f79489ee95872f94128b8cd52ff8a62e885fd74c4bae0b9afc703fd8bb70cc793941b8c604f02b358dfbabec7da7e77a40c4807892a7afca8893c65b
-
SSDEEP
12288:Cz2ZqcJzZNXdpBaB5nce2PeYCEQ7+tgx9HFN+WjOrSoy:CSZqIo5nl2BBQKiPFN+0doy
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
NEW ORDER.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
%2B - Port:
21 - Username:
application/x-www-form-urlencoded - Password:
image/jpg
p=
Targets
-
-
Target
NEW ORDER.exe
-
Size
914KB
-
MD5
677f8bda475646db668c1ce5e080b8ca
-
SHA1
7475d2ee54d4f330696f5853b6132119f197c61a
-
SHA256
8866bda657e38af9c233f592a846c0d5d13b064f133a39300b464df023c05baf
-
SHA512
8a1698a000590e3700d54c56467ee27d1bf5bb58667e75fbe64d970ea014e756d56e77e520f6d210719e2ef426d2bb80dbf4f049f1362bf128309d89d7f7a67e
-
SSDEEP
12288:+ayf4FrwPAnF+NzdC8gF/Mp13hLYlylSx1E+kDkT5u0WKDjrKiZkW3U1EeNAIvqH:us7gbhcE+kDsudKXrKfW3U1EeRgG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-