General
-
Target
New Purchase Order.zip
-
Size
790KB
-
Sample
221122-nyy57sbh29
-
MD5
fa40e3146245b3c8af86f57fe1b9a92c
-
SHA1
c9494a785f073e5da60d8eb56349926a04dae006
-
SHA256
f72be6d718240f9be4793f6fd45ac9accd67d235a71edb41426b5fe681ebdbcd
-
SHA512
c03019c70baa0b8fceabf5cfea6f57e6d716f8ecdb0fa25d0319a4748c7b0b535e7ae2a85e358246e88f9bdabccea99453e009317999e5ade62313425b6371c3
-
SSDEEP
12288:f8ZhqjemTus10dl0100HQH7g5p+8OgpSckKrZCE3GhjbNhsRubqQ8fAT751:CWemAdlMHQHGSEZfR5/fAT7T
Static task
static1
Behavioral task
behavioral1
Sample
New Purchase Order.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
New Purchase Order.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dmstech.in - Port:
587 - Username:
[email protected] - Password:
0]6F9Az.pqfd - Email To:
[email protected]
Targets
-
-
Target
New Purchase Order.exe
-
Size
1012KB
-
MD5
a58b322c74d8dfba9c022607b0d0c26b
-
SHA1
380f438ad2620f1582fe9b7d5b2ba84c3d6f3349
-
SHA256
322a82cb52dd04f516915780a9eb9865e24bd284fedecf938e345270fa0f83b3
-
SHA512
06d2ff7e199a1be0ca7357bb8e9bdbcc63f00d1082cab4ef086f344b6b88c00e2885db5e369329220463237558a43280b0d249349511ca9d6e01f8bac13f3118
-
SSDEEP
12288:SLw5APwiU251kh53ZLsVOdl0160HQV7g5D+8Egpe0kOrZsEnGvjbLhsRuDIQoiCa:IPOoSbdlYHQVGioZNtrB3m
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-