General
-
Target
Inquire Equipment.zip
-
Size
503KB
-
Sample
230606-p9t63aec4w
-
MD5
4ff2c75a805508f549e85287625ca017
-
SHA1
695bd852f3c4bdebf4577ee5ca54ee97d45dd8b9
-
SHA256
642a1f48d9c5ace4260f08821553444d060d0ad1511220f08cbafca2c6e81ae6
-
SHA512
1268c72dbea61231abca379883b2dec17bbd3bb584c5c172f2ca018a15635c782b6b84e9305512035c5ddf3792812ce1922637220329d4e61bd26ebdb88fabf6
-
SSDEEP
12288:tvGjPbtyW1R1PFPMywm0Hbu1jzjqhpD0cCdY:8DJ3wm6uPE909Y
Static task
static1
Behavioral task
behavioral1
Sample
Inquire Equipment.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Inquire Equipment.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
iebtzpacgzyullvo - Email To:
[email protected]
Targets
-
-
Target
Inquire Equipment.exe
-
Size
681KB
-
MD5
3af21ee8bbf17d53967dd7005dcc4e4a
-
SHA1
20a33dd2e3417eb675df67f83472e5bfa95739df
-
SHA256
fb36ca37495933a6fdd5da7db3dc63e1eba950c54a2626e7fbcf520118a0b09e
-
SHA512
dccde976ae09d8f8321b01c5cd88f29889151f412f74f9578b9811dd47c387832e52b5c4e1f9ff54c43534b58b651c5ec5a66a8ac2d176408ffbd4a3e837a91f
-
SSDEEP
12288:G21+j8JX0hQY11xjzKsNnsi/8EwGuoHJY:G2Ej8JUZ1hGQsk9wpmY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-