General
-
Target
PURCHASE ORDER.zip
-
Size
704KB
-
Sample
230607-qvnleabf3s
-
MD5
5999025426438e855f708d52d1f28c42
-
SHA1
5faec204f594d5ca4b77471155130db35d7d5a68
-
SHA256
0ebcef166cf7b72171b0d08040381ad00e80635633e54546823b416460ee57c1
-
SHA512
acb6ae88d43b3a8242a89e77316acdb850aac507eac8396f8d52404b031b6cb452fa23b1a15416badd7764e7554348d11bee7d070ad2dd271aa4785516f10049
-
SSDEEP
12288:q2i5xLvI80vqRA2/xk2La6SygJmGDD48doE1dZ0UqdVw:q1LwdiRAQCWgJmGDD48d3hqd2
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
kV$bSqJ1 daniel - Email To:
[email protected]
Targets
-
-
Target
PURCHASE ORDER.exe
-
Size
804KB
-
MD5
a52632bd935ef9c19ebd241c6a4478fc
-
SHA1
ee353ef4c29c8c3c5db13c226fb32c84f1b7d928
-
SHA256
b5b3f18d4a9208ec2a9b1b8e1d1e1e8dfa6f6b749223fcb021839038d015d92f
-
SHA512
fb22714a82c1561292db1409ac430def0253ae1e90d182fe173c0036bc2ba90cae306de546a5b0a131c3d69b20113031750001b4b604ca83b1fef9837c625f67
-
SSDEEP
24576:x1U9BqmycgiH75Bh2z8mmiAlaD4ob3E3d:xu9Bqmycr7kIigam
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-