General
-
Target
PAYMENT INVOICE.zip
-
Size
252KB
-
Sample
230704-g52rcacg9t
-
MD5
2ed5afd7e698dfac60f8a6886da9fdf3
-
SHA1
044c97dacfb3cd7e377c36089b86d6192bf5425a
-
SHA256
7c0c97c4f6c7ebec73406a50d48970b1c9716b1de065f5ffd8916d5530f9dc34
-
SHA512
f2c92581061c29694a1c1f374e069300c1b742e11a5622038babdfd14c1ce4581970f4b02472bbf7b4db37dfe1a5cf68f9d3f9a001e8af8423258afc1b64c59e
-
SSDEEP
6144:apU8PLWVVBpGLy5RdpkYl9JF3sVxxi/NguBQCgGBcK7VQYmU:kPLk3/1+Y7JFzNguztjO+
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT INVOICE.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
PAYMENT INVOICE.exe
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
PAYMENT INVOICE.exe
-
Size
267KB
-
MD5
99d771f9122d1277f42dcd7ddcb7721a
-
SHA1
df3baa87aed177a44fc41592738bedc0cd8173bb
-
SHA256
7cd2ed629dd0e67f352edcb542ed9ed089b0e474a97701a4036a4c9b08b8f980
-
SHA512
dcf4eede50c69e1c7aca83e63b5df51d50fe0902afdbb4919472b51a7efe6a9d787ffca24565ece25730a4ed4527264f8ab4010d3372464fc3885d7a01a4dff3
-
SSDEEP
6144:/Ya6srVVBRGLy5ftpkYljJFxsXxxi/NmeBMCgGBc47VMYm8:/YSrV3Hr+YdJFhNmeDtT2W
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-