General
-
Target
PurchaseOrder006.exe
-
Size
646KB
-
Sample
230518-rhzzcabc6t
-
MD5
1184c9784db5d46562a0453b0b30421a
-
SHA1
5d7037060b5b9c97329dc6dacf8611d58d1c23ee
-
SHA256
392f81419000cc840371e050cea8f8bc182353ee9dafa2efd158a75a54886e62
-
SHA512
019676dc11dde9165c81ba18fce04a60d5c5ac2c9779c3499f2ce728f88b10620beceeb1f8ea67a3e16cffd0b4b5871a0be7e90e6680f36e4caea9276303cb8c
-
SSDEEP
12288:qOCPglXum5BXt+v2ehvAJ3h2RI3bY0Cv0XStVF:q1sl0CR2W740i
Static task
static1
Behavioral task
behavioral1
Sample
PurchaseOrder006.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PurchaseOrder006.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6254200827:AAE72ehike93Yl10K-g-eoD9WA3Xk9taVes/
Targets
-
-
Target
PurchaseOrder006.exe
-
Size
646KB
-
MD5
1184c9784db5d46562a0453b0b30421a
-
SHA1
5d7037060b5b9c97329dc6dacf8611d58d1c23ee
-
SHA256
392f81419000cc840371e050cea8f8bc182353ee9dafa2efd158a75a54886e62
-
SHA512
019676dc11dde9165c81ba18fce04a60d5c5ac2c9779c3499f2ce728f88b10620beceeb1f8ea67a3e16cffd0b4b5871a0be7e90e6680f36e4caea9276303cb8c
-
SSDEEP
12288:qOCPglXum5BXt+v2ehvAJ3h2RI3bY0Cv0XStVF:q1sl0CR2W740i
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-