General
-
Target
Purchase Inquiry-Harman, Tijuana Plant55.exe
-
Size
639KB
-
Sample
230712-hlb71scc47
-
MD5
831693ff2e495502133ebd3ffa93e618
-
SHA1
cf9799fb785d422aa4fa67de3e547d76b2aed0c5
-
SHA256
192356050027cf305acd427d9afa09fc4bf2bebe1e2eda711554f720e281a83d
-
SHA512
dd0482a5f8daaafcc3f1ac8389ee6fd9f3ae4235ece926554568883dc25882f2b304b1566e1fefa808326e63e5e0a5fa6d1e2a152b7d597b5a2ed514988ffff3
-
SSDEEP
12288:wmWKtpStBJKSCzo3nk7sYc/2v2LX7s3jnlTN/qEa:1ppSXJi8kgYcOeLIlTpj
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Inquiry-Harman, Tijuana Plant55.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Purchase Inquiry-Harman, Tijuana Plant55.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.unrc.ir - Port:
587 - Username:
[email protected] - Password:
Basiri@1334 - Email To:
[email protected]
Targets
-
-
Target
Purchase Inquiry-Harman, Tijuana Plant55.exe
-
Size
639KB
-
MD5
831693ff2e495502133ebd3ffa93e618
-
SHA1
cf9799fb785d422aa4fa67de3e547d76b2aed0c5
-
SHA256
192356050027cf305acd427d9afa09fc4bf2bebe1e2eda711554f720e281a83d
-
SHA512
dd0482a5f8daaafcc3f1ac8389ee6fd9f3ae4235ece926554568883dc25882f2b304b1566e1fefa808326e63e5e0a5fa6d1e2a152b7d597b5a2ed514988ffff3
-
SSDEEP
12288:wmWKtpStBJKSCzo3nk7sYc/2v2LX7s3jnlTN/qEa:1ppSXJi8kgYcOeLIlTpj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-