General
-
Target
720b4ea73cbbf0d6cda0398747438500d108af0916e211065756337e13d45196.zip
-
Size
673KB
-
Sample
230805-z7rchaeg84
-
MD5
27830ad3d2fc49da1b1a7f34e6c765e3
-
SHA1
1cab656f2a0628f146b28d24188dd494165457ce
-
SHA256
57c98c0ee6d320d692b8c40432bcd5ffce9e72fcf5b1f13662a14d897f48a002
-
SHA512
8d467105966a0bfbc5cab580283b4d5398102956c468fb0abe8f9ad23a7f46d44e2d80618c9f8befbf5828d90d3705e59bdb779d408b898f61e2cfec892bb669
-
SSDEEP
12288:IeKpOHuL0BkcfBPgemotFHAwS/825f23jdJJ7/V14HiY1w:GpeBfBzXA182g3jJ7U6
Static task
static1
Behavioral task
behavioral1
Sample
New Order PO 208472747_IT.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
New Order PO 208472747_IT.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
rwziqmgfaoeffcdm - Email To:
[email protected]
Targets
-
-
Target
New Order PO 208472747_IT.exe
-
Size
1.3MB
-
MD5
c447c561925b77d52242def762ee394b
-
SHA1
ed080f397aacf655e9beb0583646f019e069f91d
-
SHA256
2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2
-
SHA512
fe2755a2157f2987231de96b4120f38af8849db21a9bf67fef253be63acfba29a39fae68ddb6a23781018d62cd89ac177dffc6faf7164499e64992571a07b575
-
SSDEEP
24576:45TTngb0u1iILnraOqHz9Yen5f6CDruxp6/:+g+I3+pZ5SCDrCp6/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-