General
-
Target
INQUIRY.ACE
-
Size
574KB
-
Sample
231011-x9zesaag42
-
MD5
72749e7307ddf88784007c60950234e4
-
SHA1
f9936f465942f1f1f2a8bc414d0b531a2bc2e30f
-
SHA256
c0be416f634cabe2dc88908df4f27383d517083a110504c5a14fd337c0fb8c6c
-
SHA512
24ddeccc5923bef3dac43cb577b9c81e1ab2a912635ba1c1460be8ce4c4b6ea1664fbe1b4d73f98feb251708f24ef8e3124f353924b8c34a419790ea30b10c70
-
SSDEEP
12288:G7B3nQr58An3tv9clnHiBtu8xthnKNbkxHaget4YygIpo9rcrqz4t:+pQeA3Y8Btphn8bk/YSG1crP
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
INQUIRY.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.versandundco.de - Port:
587 - Username:
[email protected] - Password:
church12@ - Email To:
[email protected]
Targets
-
-
Target
INQUIRY.exe
-
Size
608KB
-
MD5
789f2265dfa99a6207f555a5caa4b9d9
-
SHA1
15e8f77576fc8261c25d45a9ac0d196d4086b711
-
SHA256
ccee252d64856661eb0ce8ad16565d08ac0013c49e3c386e8011ce1921682d59
-
SHA512
5229145efacae1a1e907b5d66dc84c42c60b6e45b682f95f1ed7086e8fad1a9ebd90ce8e78ad7e6a2a9d404bf134586ca360cb54ddbd1fba124dd58227a33ad5
-
SSDEEP
12288:O725hdSZJmFLiuYgZdyTnhJLRXqiWE1xbdp1U9V63jh:t1SZJWbYPnhJRXqMzKV2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-