General
-
Target
Order PO230325174.exe
-
Size
304KB
-
Sample
230418-lneygacd71
-
MD5
377a84d2218cb6c710595b066ef37ba7
-
SHA1
73ab065c6bed38d832c70d72a2fb2c16462f546f
-
SHA256
44b75803f16adb7768ad6ce2fcb8f56422a665085ac5aaebbce5fc8639bd352c
-
SHA512
092a0fde188f590c24a8c5fecd2c25069681603c8b7c76912f41e329d93b78b55f9e18caf866775d391187610c9cfbdeaf168819c8bfac203cf7a67ca1f60e98
-
SSDEEP
6144:/Ya61pD8pgbubbOtq5pJvAON2wjZcdo8EiJm6FISnieIuApf7W:/YXpD8pgbsbZ5/vbNZjZv0TuZuAp6
Static task
static1
Behavioral task
behavioral1
Sample
Order PO230325174.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Order PO230325174.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
Order PO230325174.exe
-
Size
304KB
-
MD5
377a84d2218cb6c710595b066ef37ba7
-
SHA1
73ab065c6bed38d832c70d72a2fb2c16462f546f
-
SHA256
44b75803f16adb7768ad6ce2fcb8f56422a665085ac5aaebbce5fc8639bd352c
-
SHA512
092a0fde188f590c24a8c5fecd2c25069681603c8b7c76912f41e329d93b78b55f9e18caf866775d391187610c9cfbdeaf168819c8bfac203cf7a67ca1f60e98
-
SSDEEP
6144:/Ya61pD8pgbubbOtq5pJvAON2wjZcdo8EiJm6FISnieIuApf7W:/YXpD8pgbsbZ5/vbNZjZv0TuZuAp6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-