General
-
Target
purchase order.exe
-
Size
955KB
-
Sample
230210-xsap4afh6w
-
MD5
83027ceebd07df0f927f780be4dbc729
-
SHA1
acbc3142cac50ab28474f5c8945585e2c07ba81d
-
SHA256
66fcc078741968b04e45e850256bcf6f64506fd143a5b9ebf31b5244d423e277
-
SHA512
c7516c61db56217fa75817f93242ecd5c1add40a59d8cda221f51d6199e11817bc31c8cc808cde3377aa1df1266a6ad36f5022a21163ae4d1d39ece4e18ff2ee
-
SSDEEP
24576:4p1/YGDkjwJsoGlWM9STNNS/GoqMUwwhvgoK3:4ptY5UsoGlxZ/GotU/v
Static task
static1
Behavioral task
behavioral1
Sample
purchase order.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
purchase order.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5615947415:AAHTRsWQ236jQ31p3gNngAMLROoKsqd6tPs/
Targets
-
-
Target
purchase order.exe
-
Size
955KB
-
MD5
83027ceebd07df0f927f780be4dbc729
-
SHA1
acbc3142cac50ab28474f5c8945585e2c07ba81d
-
SHA256
66fcc078741968b04e45e850256bcf6f64506fd143a5b9ebf31b5244d423e277
-
SHA512
c7516c61db56217fa75817f93242ecd5c1add40a59d8cda221f51d6199e11817bc31c8cc808cde3377aa1df1266a6ad36f5022a21163ae4d1d39ece4e18ff2ee
-
SSDEEP
24576:4p1/YGDkjwJsoGlWM9STNNS/GoqMUwwhvgoK3:4ptY5UsoGlxZ/GotU/v
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-