General
-
Target
Purchase Order.zip
-
Size
532KB
-
Sample
230502-h13nhsbh3y
-
MD5
dab8ed373763eb8fb9a60a52386d446e
-
SHA1
5e9f27998a9355155a74d8eb489dcbe330596d40
-
SHA256
518f005ddf764a1dd2830079e2734fb3e30b590e00627a71bac4c3fe2f88446f
-
SHA512
b964a090b64477bd4d0b0b5a68e966d48af444b269b7886df6344093779b0c2ca9bf9484336bfc79965f9d9b124378012247371c3cf80cfdcb082f83a01d70fd
-
SSDEEP
12288:h/EYCYjC7hmVPkC6PyqdejHTTsvtLj2zmYHxgXZyLwQGnFCw:hM+DZkUe2zjzmOxgl5nkw
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.expertsconsultgh.co - Port:
587 - Username:
[email protected] - Password:
Oppong.2012 - Email To:
[email protected]
Targets
-
-
Target
Purchase Order.exe
-
Size
656KB
-
MD5
53dbe9cfe79080637302bb098827ca31
-
SHA1
8d07e7a67afa17b3e4288c74921c724e5af6f3ac
-
SHA256
dd344c32dd59a635e9ebfec3a33f2242178c82498769b995d7fb1c47a34882c8
-
SHA512
edb00b7fc53ea6d0ff9e7e689df6480867b9a304600a32490355a6bf22507dc9bca3a9e498bea71b8d59541bc4caa671c1e8c9a258de2bae6e89852baabc9eab
-
SSDEEP
12288:AwZdXrj8HvgDKjFvWqGpj9rTwLDLT2zmYHpkXVygD7+btTDb1V1:r77j8Hv7ch9JnzmOpk5qlP1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-