General
-
Target
Contract Invoice document.zip
-
Size
551KB
-
Sample
230605-tmc2gsaa8y
-
MD5
32b849ed199ed0ae0c42e23fa5337436
-
SHA1
6aedc337d66725a768124d9b088b050f138fe2b7
-
SHA256
1ba78ff4aad674810f2bd6bd9d0153d4b22423601805cf0beb1d198a05d6c0d9
-
SHA512
68b28b86e45dbafe7adad003c50a8d3b36516be9b1fd9677c04a5a8fad6c039d125b6f1d9f14158fd1bd29728efb662380170b3e8afe935ea314dbf99a308db3
-
SSDEEP
12288:Z+MzwULHygZjYRH9Kb5Fq6W20kMnB3af5TmL5YCpkIHx8:ZpztERQO6en4fM71HS
Static task
static1
Behavioral task
behavioral1
Sample
Contract Invoice document.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Contract Invoice document.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
iebtzpacgzyullvo - Email To:
[email protected]
Targets
-
-
Target
Contract Invoice document.exe
-
Size
700KB
-
MD5
2d7ed81d34091273b1538759705ac990
-
SHA1
465b350600a5561ad892e259f81ff2aa065e2b76
-
SHA256
82ff0a181a498c9a794c085821aeec269122f36c222dfcf31ea39d71d6b4c9f9
-
SHA512
1d3335f0170b993c6e96e3181937d7f12adb0f12bb2560b20f2c7a29097cb21b9a507a8c2f9e07a4f466f2b115098e37c00866cc8cc807e978072066e5b3be92
-
SSDEEP
12288:AvV+s1bSQT6tjjdB408SwuqM9Scx/zChU7z0p2XhIK137I5m1OXGI4j5s:AtHRuJoY/ehU30kh37/Au
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-