General
-
Target
PURCHASE ORDER No. 859309292.exe
-
Size
730KB
-
Sample
221102-ce6v6ahcem
-
MD5
304b50b484cdddc92c6251c85529b4fc
-
SHA1
571afe2de87bc6d04cd43f239630db00bbb1e5b0
-
SHA256
c05b7b394c6fd0211f67dae500bd48d89b0ce2d16ff2088ca657b1fed475599d
-
SHA512
966b7e0a94a46ae2bbe1c5a2fddf4690c352fbc55c427b82f303a50fb20c3522e256b3b4a146f824e991fcb90cf3adec1c7b4fa5a0a314e61ae098dbdf73a9b3
-
SSDEEP
12288:n90houHH1J+0l1ry+rwLYh/gGr7AeV5X6UfSGGqCCjWnBaeAC:nlu1d1ry+0LYhF7AM6Uf/CPan
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER No. 859309292.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER No. 859309292.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.alfawalum.com - Port:
587 - Username:
[email protected] - Password:
INFO@ALFAW#ALUM21
Targets
-
-
Target
PURCHASE ORDER No. 859309292.exe
-
Size
730KB
-
MD5
304b50b484cdddc92c6251c85529b4fc
-
SHA1
571afe2de87bc6d04cd43f239630db00bbb1e5b0
-
SHA256
c05b7b394c6fd0211f67dae500bd48d89b0ce2d16ff2088ca657b1fed475599d
-
SHA512
966b7e0a94a46ae2bbe1c5a2fddf4690c352fbc55c427b82f303a50fb20c3522e256b3b4a146f824e991fcb90cf3adec1c7b4fa5a0a314e61ae098dbdf73a9b3
-
SSDEEP
12288:n90houHH1J+0l1ry+rwLYh/gGr7AeV5X6UfSGGqCCjWnBaeAC:nlu1d1ry+0LYhF7AM6Uf/CPan
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-