General
-
Target
PO#JB2210-0005.exe
-
Size
1.1MB
-
Sample
221027-jrjdysbdg8
-
MD5
5f4e321afe6c6ed548bd0b0639a9becf
-
SHA1
ad5d36422703881da14c98dd1423492af8113092
-
SHA256
0a0286f5c4b0657f3e4e961241d0b127810135e726de296c914358e97d983e98
-
SHA512
78d45e03d2134d9aa4292d0f76a8a9b4de17877552c67d92b38e4487baaae15a41603d6dea8e4f1d2054add740d73974ab5415f3e25c629bf309f0e060e0a799
-
SSDEEP
24576:d4jt/DxX2ZyrRT6nbS2qyTK1TT1bB2QwTFa0dszfqJ4VB2sh:Kjt/8y6cyTK1tbcXTFaqszfqJ4L2
Static task
static1
Behavioral task
behavioral1
Sample
PO#JB2210-0005.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PO#JB2210-0005.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
PO#JB2210-0005.exe
-
Size
1.1MB
-
MD5
5f4e321afe6c6ed548bd0b0639a9becf
-
SHA1
ad5d36422703881da14c98dd1423492af8113092
-
SHA256
0a0286f5c4b0657f3e4e961241d0b127810135e726de296c914358e97d983e98
-
SHA512
78d45e03d2134d9aa4292d0f76a8a9b4de17877552c67d92b38e4487baaae15a41603d6dea8e4f1d2054add740d73974ab5415f3e25c629bf309f0e060e0a799
-
SSDEEP
24576:d4jt/DxX2ZyrRT6nbS2qyTK1TT1bB2QwTFa0dszfqJ4VB2sh:Kjt/8y6cyTK1tbcXTFaqszfqJ4L2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-