General
-
Target
Approved Purchase Order Nr.227.exe
-
Size
765KB
-
Sample
231011-y7s1nadd54
-
MD5
563b0fcdde7369186ac38d0b09306aa7
-
SHA1
df516393eb762506b627b6257b9d83ceb61d80f8
-
SHA256
d0bcfaba75056d8d1e308e4088122850eea75007f191b5c8d9aac67e8cd0dfe3
-
SHA512
4baf303d8f2b353a40626ccf80a6b409a2ff162a1e505fcf4ff15a1a7d1a67ca89543f046ff457fdfaa80040242bd4c44172794a31e06a25ab069f859f174a8f
-
SSDEEP
12288:w7252w6Wl3ZgY3RBxx7a4OQDkAncT9HyWCk7cUxvReS+uhQM:rIDWtZgWRBT7a4O/d1Isbx1h
Static task
static1
Behavioral task
behavioral1
Sample
Approved Purchase Order Nr.227.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Approved Purchase Order Nr.227.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1154326258021302292/Mu1LJr5Hzwgzt-oP0UaMu9jKsw-MNZUKEgkvdMj2iCXAeS6mmpa6xyfstP-NGi9M7fEY
Targets
-
-
Target
Approved Purchase Order Nr.227.exe
-
Size
765KB
-
MD5
563b0fcdde7369186ac38d0b09306aa7
-
SHA1
df516393eb762506b627b6257b9d83ceb61d80f8
-
SHA256
d0bcfaba75056d8d1e308e4088122850eea75007f191b5c8d9aac67e8cd0dfe3
-
SHA512
4baf303d8f2b353a40626ccf80a6b409a2ff162a1e505fcf4ff15a1a7d1a67ca89543f046ff457fdfaa80040242bd4c44172794a31e06a25ab069f859f174a8f
-
SSDEEP
12288:w7252w6Wl3ZgY3RBxx7a4OQDkAncT9HyWCk7cUxvReS+uhQM:rIDWtZgWRBT7a4O/d1Isbx1h
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-