General
-
Target
PURCHASE ORDER.exe
-
Size
619KB
-
Sample
230802-jwwj3sef5z
-
MD5
d433647fb9f9e33e6d6b6e505cb04e95
-
SHA1
44f55d93fff918662193a7263fcad43da0e3ba26
-
SHA256
cabf5777651e17c1d64384cefbf5f7ce2fc7abedff68901c96174dd16612caf1
-
SHA512
c26dc1708d33a95e3fc9fc37fe3bc01cbcbc0c5d8e5894cfeea824fc9e22f2b9619e8826939bc641f68edfba41c3a04265f28aa1cdbaaee02c50dbe29791dbe9
-
SSDEEP
12288:742iN8JJfJTocrwv9uXARh8MQX604hWyAG4Wx7YI7e5UCB2NkfeM:741uJPT5w6w9W604EyAa25nW
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
kV$bSqJ1 daniel - Email To:
[email protected]
Targets
-
-
Target
PURCHASE ORDER.exe
-
Size
619KB
-
MD5
d433647fb9f9e33e6d6b6e505cb04e95
-
SHA1
44f55d93fff918662193a7263fcad43da0e3ba26
-
SHA256
cabf5777651e17c1d64384cefbf5f7ce2fc7abedff68901c96174dd16612caf1
-
SHA512
c26dc1708d33a95e3fc9fc37fe3bc01cbcbc0c5d8e5894cfeea824fc9e22f2b9619e8826939bc641f68edfba41c3a04265f28aa1cdbaaee02c50dbe29791dbe9
-
SSDEEP
12288:742iN8JJfJTocrwv9uXARh8MQX604hWyAG4Wx7YI7e5UCB2NkfeM:741uJPT5w6w9W604EyAa25nW
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-