General
-
Target
Servo purchase Order.zip
-
Size
304KB
-
Sample
230301-k8fvtsfe68
-
MD5
64325474ecdc8b4f278322086c593c42
-
SHA1
76b4c673645fc45afcd61c0d1c12de932fdd22fb
-
SHA256
ab9069af38e75eafdd34fb782a1f99f96e4c8cabc0ac9c0022b5c96e5b08b058
-
SHA512
7b94a2ccb9d11640326f5185a43a476bba5c36c8d7f3929b7516becc2d26fbc62f9bea7c3b5a5010bbd5f35b7f03b92ffa82b0c9b922b8c9c4f5777addec4e3a
-
SSDEEP
6144:L/pHIONP2WE/TeaHKqUc1/3AZ+z/VdIawLoTAyWd0o8Yv:LBHIOh2VqSpUc1k+8eAyWdJv
Static task
static1
Behavioral task
behavioral1
Sample
Servo purchase Order.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Servo purchase Order.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
Servo purchase Order.exe
-
Size
318KB
-
MD5
eeb2586b016149e4ac3fe2b099b0373e
-
SHA1
5f30d98b1ea3aa8ca086bcbfa8ae4d5df7081466
-
SHA256
644ba86dd5681951ce4ee926d5a596de429ae7c161bb9de32a7d8e825986585e
-
SHA512
c529069cfd6588801e4fc02dd91d1fedcb117e19ee87f7e14dd52e5eca2ee477e8cf2a0253346aaddb82037add62b5be9c22aad1e5dfd1edf24d0513bbd99337
-
SSDEEP
6144:vYa6eueeIPSWE/TeaHGqUcj/3AZ+zLVdIa8voTAyWd8o8YE:vYguVKSVqSVUcjk+ueAyWdxE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-