General
-
Target
INQUIRY.exe
-
Size
790KB
-
Sample
221003-hsnjmacda3
-
MD5
17a16fdeda33edf4b8138df1e60fb83e
-
SHA1
0e51a45c5e08fbcfa8aa4382129cd44690f6df63
-
SHA256
413c242bae0ea6bcd5f06089f06afabc0b6f156192cbf7ac48f7b7e0379d02ae
-
SHA512
a90832515d127ab6982717d0eea020a4bd45b0a86a31d953816b637671e8b2bfe2f10f5fb24119f0d9c35ddb26db998d77e157ab791ad3cb23ef4482801dca3c
-
SSDEEP
12288:mxuADqjJ5nhZwSIAAG6N9OS0g0av0/2vahdq60+9MK:XjrhZbIAwN/01Duva/qQe
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
INQUIRY.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.sseximclearing.com - Port:
587 - Username:
saurav.roy@sseximclearing.com - Password:
Ssxm@9854
Targets
-
-
Target
INQUIRY.exe
-
Size
790KB
-
MD5
17a16fdeda33edf4b8138df1e60fb83e
-
SHA1
0e51a45c5e08fbcfa8aa4382129cd44690f6df63
-
SHA256
413c242bae0ea6bcd5f06089f06afabc0b6f156192cbf7ac48f7b7e0379d02ae
-
SHA512
a90832515d127ab6982717d0eea020a4bd45b0a86a31d953816b637671e8b2bfe2f10f5fb24119f0d9c35ddb26db998d77e157ab791ad3cb23ef4482801dca3c
-
SSDEEP
12288:mxuADqjJ5nhZwSIAAG6N9OS0g0av0/2vahdq60+9MK:XjrhZbIAwN/01Duva/qQe
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-