General
-
Target
RFQ#00388-SJOMAN ENGINEERING LLC.exe
-
Size
885KB
-
Sample
230301-js9yasfc66
-
MD5
0db685d98e98abaf4214262dec358b6f
-
SHA1
66b3f2a05061b53ecc5ef881400f1ef30452f2b3
-
SHA256
66b93d3953720772c3adf5f424c5dc4d5e6a61c7e9d08157ccf8ad9eec069f1c
-
SHA512
5896e9851f34b82f0a4da16f698b12ccca1c6685480d9dda8de09c51263f0ec8d3e888166453d84e5b0e5f52ef4968d51d2b4410e79421b5153282bb16d8f478
-
SSDEEP
12288:IKQa8hYsUkIq6HE0rwKfNvhM8fhLsYX8CdClLqbMqcESTQxNqv6nnjqKoeM:IT0p7rFNvhMAsYZduLDPEp26nnjqKoeM
Static task
static1
Behavioral task
behavioral1
Sample
RFQ#00388-SJOMAN ENGINEERING LLC.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
RFQ#00388-SJOMAN ENGINEERING LLC.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.kamtechworld.com - Port:
21 - Username:
[email protected] - Password:
**noE&0Reh[0
Extracted
Protocol: ftp- Host:
ftp.kamtechworld.com - Port:
21 - Username:
[email protected] - Password:
**noE&0Reh[0
Targets
-
-
Target
RFQ#00388-SJOMAN ENGINEERING LLC.exe
-
Size
885KB
-
MD5
0db685d98e98abaf4214262dec358b6f
-
SHA1
66b3f2a05061b53ecc5ef881400f1ef30452f2b3
-
SHA256
66b93d3953720772c3adf5f424c5dc4d5e6a61c7e9d08157ccf8ad9eec069f1c
-
SHA512
5896e9851f34b82f0a4da16f698b12ccca1c6685480d9dda8de09c51263f0ec8d3e888166453d84e5b0e5f52ef4968d51d2b4410e79421b5153282bb16d8f478
-
SSDEEP
12288:IKQa8hYsUkIq6HE0rwKfNvhM8fhLsYX8CdClLqbMqcESTQxNqv6nnjqKoeM:IT0p7rFNvhMAsYZduLDPEp26nnjqKoeM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-