General
-
Target
Payment 23000 txt.exe
-
Size
318KB
-
Sample
230216-rhwxpahh62
-
MD5
446106ea455202b921824bf9cef1936a
-
SHA1
b9c5ddf3c229ad0dc0b2da455d20126a17763b50
-
SHA256
5da6e929fadc2bc023caabd731cf4281dd4f16dde83046b8fce288df2780d562
-
SHA512
3411bb4bb846acf08e156a3e47bc00ad2f80e1dcf0cb3ed90a7566d5951307ffb2d6e89f44ae4fcf222bf81bb87293a5573a9c08c4ca867040c6fd6334141f48
-
SSDEEP
6144:vYa6SeiG69rTy8UE2Wvc5kLhXU3UzaEVamm44UCzOg7T4mu6Q/hBT/7eWJ1I4IUv:vY01J9rTfvb9GUzhYtJQ/D/KWPb
Static task
static1
Behavioral task
behavioral1
Sample
Payment 23000 txt.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Payment 23000 txt.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.azmlogistics.com - Port:
587 - Username:
[email protected] - Password:
cJ0Py0z8]6@U - Email To:
[email protected]
Targets
-
-
Target
Payment 23000 txt.exe
-
Size
318KB
-
MD5
446106ea455202b921824bf9cef1936a
-
SHA1
b9c5ddf3c229ad0dc0b2da455d20126a17763b50
-
SHA256
5da6e929fadc2bc023caabd731cf4281dd4f16dde83046b8fce288df2780d562
-
SHA512
3411bb4bb846acf08e156a3e47bc00ad2f80e1dcf0cb3ed90a7566d5951307ffb2d6e89f44ae4fcf222bf81bb87293a5573a9c08c4ca867040c6fd6334141f48
-
SSDEEP
6144:vYa6SeiG69rTy8UE2Wvc5kLhXU3UzaEVamm44UCzOg7T4mu6Q/hBT/7eWJ1I4IUv:vY01J9rTfvb9GUzhYtJQ/D/KWPb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-