General
-
Target
PURCHASE ORDER.exe
-
Size
586KB
-
Sample
221129-mga7dadd5x
-
MD5
a55b4bb09398659d69f1b8b37541e621
-
SHA1
975f7c38780d00ae497fcb6addf31f5ad8cdb090
-
SHA256
ea45a2032eebe69d32b15d3ea505330eb00b5026107e8e123fb9fb9e2bf87496
-
SHA512
a5eb89b7b07ad51b747ba5c003d50ae8aa53c11adb23034da977e8ab25373a81c3c7216cda025c25a0d55f9cab989f93794d2512fb16a8998dfa8d58c5210590
-
SSDEEP
12288:7gkzrbETClvHskFgFwIyXCD1vmAMDfJ0/IegnS1onhj6W4ytrRpMf:/76CVskFgqIyXFhS/ngSWhxROf
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.orogenicgroup-bd.com - Port:
587 - Username:
amir.hossain@orogenicgroup-bd.com - Password:
Hossain$3400 - Email To:
info@ledcenter.by
Targets
-
-
Target
PURCHASE ORDER.exe
-
Size
586KB
-
MD5
a55b4bb09398659d69f1b8b37541e621
-
SHA1
975f7c38780d00ae497fcb6addf31f5ad8cdb090
-
SHA256
ea45a2032eebe69d32b15d3ea505330eb00b5026107e8e123fb9fb9e2bf87496
-
SHA512
a5eb89b7b07ad51b747ba5c003d50ae8aa53c11adb23034da977e8ab25373a81c3c7216cda025c25a0d55f9cab989f93794d2512fb16a8998dfa8d58c5210590
-
SSDEEP
12288:7gkzrbETClvHskFgFwIyXCD1vmAMDfJ0/IegnS1onhj6W4ytrRpMf:/76CVskFgqIyXFhS/ngSWhxROf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-