General
-
Target
PO.exe
-
Size
1.0MB
-
Sample
221020-q2dd1sfhbm
-
MD5
cfdec88ac7feaa26bdea4193692080de
-
SHA1
612d095ff7ffe3325df534328d2049af2070437a
-
SHA256
1d3996c785708445a5d7425439d3e90ec63bd6949acb87ecc2c9116a65ffc879
-
SHA512
691a783418ca67c15afe5961080ec7e1e369260ef8ccffe9c0163cfdc41553d946d3805d145e09b0ade8babdb3abc5f1df9d9ec03512eac95f9e96f2f9cd5893
-
SSDEEP
12288:Park1jH1vk9SKOGhvqVlfEufQdOKlZ0bsGN5WHCAZYp+1fB3MwQmpV9VAs7XYYS/:PaFdOKf0bsS5QCAWpoc7wVAs7IY
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
PO.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.afcargo.com.my - Port:
587 - Username:
[email protected] - Password:
ar6606m2
Targets
-
-
Target
PO.exe
-
Size
1.0MB
-
MD5
cfdec88ac7feaa26bdea4193692080de
-
SHA1
612d095ff7ffe3325df534328d2049af2070437a
-
SHA256
1d3996c785708445a5d7425439d3e90ec63bd6949acb87ecc2c9116a65ffc879
-
SHA512
691a783418ca67c15afe5961080ec7e1e369260ef8ccffe9c0163cfdc41553d946d3805d145e09b0ade8babdb3abc5f1df9d9ec03512eac95f9e96f2f9cd5893
-
SSDEEP
12288:Park1jH1vk9SKOGhvqVlfEufQdOKlZ0bsGN5WHCAZYp+1fB3MwQmpV9VAs7XYYS/:PaFdOKf0bsS5QCAWpoc7wVAs7IY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-