General
-
Target
Purchase Order list 58732.pdf.z
-
Size
232KB
-
Sample
230327-qd4w3aff3v
-
MD5
9759cda218b7cb9fa1a7df976d721027
-
SHA1
85b3bb7cb020afc5c264fb8fcabca4d7a355ee99
-
SHA256
5b69da44236696fcd58a56ae7085b1f357ba9c763e6c0181a175db0411ce7e29
-
SHA512
619d72dfa455dafe4ebf66036e793626960bd29a9c0b9657d967245ae6002536d0713acc0ab3ca43f2b54257de3421d91f590df2b93113ffa353ec94f4b74c80
-
SSDEEP
6144:LGXQitcpgp3d6ZRBMyNHmUBp9Hh3biqkvdR:LGJ6mp3d2rBXheq4R
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order list 58732.pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase Order list 58732.pdf.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
warzonerat
91.192.100.10:11011
Extracted
Protocol: smtp- Host:
mail.mondistar.ro - Port:
587 - Username:
control@mondistar.ro - Password:
MondiStar@2018!
Extracted
agenttesla
Protocol: smtp- Host:
mail.mondistar.ro - Port:
587 - Username:
control@mondistar.ro - Password:
MondiStar@2018! - Email To:
sales5dept@yandex.com
Targets
-
-
Target
Purchase Order list 58732.pdf.exe
-
Size
307KB
-
MD5
dbaa3eedb475065eb8d88c1e9e04c2de
-
SHA1
bd2bbf3940dbfa53ddacba057333c88c77e5372d
-
SHA256
853e1ec7d4d8fa449d88746cab1bfac6074e0d81e9a26ef6948793059e9bd781
-
SHA512
9dea4831e8b01d0f9726ba9d31f786fdbaf1334340042282548a138b83e13d639403d814b8f16ee7572044941b3417c503240ee56c8c4d782c265fb6520b4509
-
SSDEEP
6144:u8fqDye3NCT8yGjm04y0O12udoEUAaZbyHfI:tiCgD4wldEiHfI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-