General
-
Target
PURCHASE ORDER.zip
-
Size
306KB
-
Sample
230111-kba83sfe21
-
MD5
9ec1e2bc60193e83beeac012cb30f6df
-
SHA1
46fb96800fefa00b001e84464940eb747e395b5e
-
SHA256
374738a1cb689c18f12a3a8c0e079080b49d974794e45b91880eac70cbfcc911
-
SHA512
3b42b0762914e089fdc32d99ae7220f821f7ac36fc00c14ca5c4dfb3187bd0cfe911b342ad8870f59ab0d02a2132907ddbcb837b8a0cbd01f67f1dea2675fb2c
-
SSDEEP
6144:960La6B8CAjv/KcAJH/Gax9YabUP0UHBG8p8r53XOIF7OSft/H97b5:Ta6p/D5jOabCrhjK35Cqt/HF9
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sseximclearing.com - Port:
587 - Username:
[email protected] - Password:
Ssxm@9854 - Email To:
[email protected]
Targets
-
-
Target
PURCHASE ORDER.exe
-
Size
462KB
-
MD5
cc9076a6bd489b43111476ac1dafc23e
-
SHA1
137a3eaa6f4f03f22e1cdae233dbf15861d659cc
-
SHA256
f2d560f960b4ab660621fef4d25d6b83b27da3deb53c1b0159c8abbc935a0ce4
-
SHA512
93619489deaa391e8916503ebe68b86cc6d4d1cdcafe3bdd10707eaaba34c17fb3218fe3a8efbe8d3589a7d7249f6d68afb46d2a1d38d1e5e10052965e5b61c4
-
SSDEEP
6144:qYa6DH51gRlSJfbv/2cAXHJGax96abkP0sHBGopCj531OIB7gSLt/HQ7bN:qYJZVJfiDZjMaby5hl23rsEt/HuJ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-