General
-
Target
PURCHASE ORDER.zip
-
Size
256KB
-
Sample
230703-lc2m4aha9x
-
MD5
423cd5b549c2872857367db133b960a4
-
SHA1
96d1786135463ac8342694cf617d6b34612b0266
-
SHA256
f9f83c3846cb77a82a67e231f5d770d805f486cf602798b3d4d4444255bb87ef
-
SHA512
59e68b0d9e036330d881477335d374ea0687926159004603899ca4baa52d61cde5c0f9a1700dd27d9ab640f80f226b70a7aa4c1dec927cdc9cf61535692a21d4
-
SSDEEP
6144:lpU8PLxNSraik7I/knzPvRPMwrmqFb3P7c1lb0mf3aD47:7PLxNE3lsnTRPMwrmqV3DUlAOaM
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.exe
Resource
win10v2004-20230621-en
Malware Config
Targets
-
-
Target
PURCHASE ORDER.exe
-
Size
271KB
-
MD5
664fc03c56695b1fe1cfa34159cc36dd
-
SHA1
f9dd1ebc4f3d60c7c7400c8d1b67164a0e3f98a2
-
SHA256
156c6d57b228e6b5a8920f268f26b70b5fb6ec53b255f102f2dc9f7fa21c9097
-
SHA512
b52a6332e7abf43747ea2aa64173efeecbf7bcae3935e56563d949c12bef50f2b7d75a30a8147bdcaa676e945ccb31e04dc89fe1c736d92a77588540834709f9
-
SSDEEP
6144:vYa6coraik7e/kTz9pRPAwpm4Fb3P7c9Vb0mH3a64x:vYa63JsTvRPAwpm4V3DSVA8aR
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-