General
-
Target
invoice.exe
-
Size
973KB
-
Sample
220925-ewybfsdbh7
-
MD5
86f1eb5561c5b8fe00a8d326e0db454f
-
SHA1
925975a2a419e1a41f8655547f5c63804a040fc4
-
SHA256
0fef960ffcfff1054c86a8972e70e39bfb3dd027111375db011d7583c2175ed8
-
SHA512
f2a9859b8d21af570e04f1252f0167b38b032ba789df96e882c050e027f92c9165d2038f6b5c471d8f7423e1dcf00d49b30c66b2eaec1b42527129b46d749965
-
SSDEEP
12288:NhLuyAH0u8kw/YAo1JcOqlGwJ+0syBfptO578+X58aR7LmkGAz:NhLuyy31E3lG0jTS78+XSahI
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
invoice.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.pisc.lk - Port:
587 - Username:
[email protected] - Password:
PIsafeTY2021
Targets
-
-
Target
invoice.exe
-
Size
973KB
-
MD5
86f1eb5561c5b8fe00a8d326e0db454f
-
SHA1
925975a2a419e1a41f8655547f5c63804a040fc4
-
SHA256
0fef960ffcfff1054c86a8972e70e39bfb3dd027111375db011d7583c2175ed8
-
SHA512
f2a9859b8d21af570e04f1252f0167b38b032ba789df96e882c050e027f92c9165d2038f6b5c471d8f7423e1dcf00d49b30c66b2eaec1b42527129b46d749965
-
SSDEEP
12288:NhLuyAH0u8kw/YAo1JcOqlGwJ+0syBfptO578+X58aR7LmkGAz:NhLuyy31E3lG0jTS78+XSahI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-