General
-
Target
ROCA - PO - 4501226854_Order.exe
-
Size
9KB
-
Sample
230612-lkcc6sbc23
-
MD5
5e182ccf4156322e8c083b22aa6ec731
-
SHA1
3f6dcd420d043b35a81af9323a09e1ebd2662e36
-
SHA256
feb5ecbe032c4c81268dde1395cfeb1d2a418780de95e6ec4666cd1a32c108c5
-
SHA512
bec162fa71a618b225302523abed6cfedfc47808c00ca04647f9005d566cbf2dd2b2c56274fd7e02b11bd3b00e9b4c298ff073b8e458478a9f14c8672eb5e177
-
SSDEEP
96:jmKoyA2mr8CvhQBHfM+Bzm6GcKquEkkDKpHJrr1qfoumtY/RZvGg8HWt2l2Jomsv:jm352mhvJ6GQu6hU27986oBXRHt
Static task
static1
Behavioral task
behavioral1
Sample
ROCA - PO - 4501226854_Order.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ROCA - PO - 4501226854_Order.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5159960936:AAGB2EqXG95agQI3zF5DlGHwwIPzKTOghj8/
Targets
-
-
Target
ROCA - PO - 4501226854_Order.exe
-
Size
9KB
-
MD5
5e182ccf4156322e8c083b22aa6ec731
-
SHA1
3f6dcd420d043b35a81af9323a09e1ebd2662e36
-
SHA256
feb5ecbe032c4c81268dde1395cfeb1d2a418780de95e6ec4666cd1a32c108c5
-
SHA512
bec162fa71a618b225302523abed6cfedfc47808c00ca04647f9005d566cbf2dd2b2c56274fd7e02b11bd3b00e9b4c298ff073b8e458478a9f14c8672eb5e177
-
SSDEEP
96:jmKoyA2mr8CvhQBHfM+Bzm6GcKquEkkDKpHJrr1qfoumtY/RZvGg8HWt2l2Jomsv:jm352mhvJ6GQu6hU27986oBXRHt
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-