General
-
Target
61282741d16852c435b538a5bb02986bb981acd87521bc00ac59f531c28fcc9c
-
Size
1.2MB
-
Sample
231207-c4e4qsadh8
-
MD5
004a0cec736916a068f9db0b50d1a78d
-
SHA1
7657b2df5190617a3d4a5c16a882c7d9c33db59d
-
SHA256
61282741d16852c435b538a5bb02986bb981acd87521bc00ac59f531c28fcc9c
-
SHA512
f89782bbba78569007a75fc1adf82d0cfee26c53d26bbec038066c0b0a548cd022579b012e95637bb1eccc5e4126ed50adafc3ddd431408de61bff15ee3432f0
-
SSDEEP
24576:1qZFQt0n2OozVfH5X8nU2fkHN+u2i5yzr/+QD:15t02BzVfG425z6Y
Static task
static1
Behavioral task
behavioral1
Sample
ORDER_SP.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
ORDER_SP.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server273.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
q@OOZf!+4ERy - Email To:
[email protected]
Targets
-
-
Target
ORDER_SP.EXE
-
Size
696KB
-
MD5
942159927d5bc0cb1b02e398584cf1a9
-
SHA1
ef7a0a018ce8389b5a5e7c5af7a787a5695e3ebe
-
SHA256
bb6455721221afb980661df55c7aa8ae40d04986bb48bb32638c656654955d91
-
SHA512
fb4ac3c81e7e1485de6fc48909bfb3dbf54d54067ba95ca6d540cd70a550d2e5e23f5b868afd217e906adaa64eff3994576248bacd1859bd7950cdb0919f2842
-
SSDEEP
12288:KueH5qZFQVFuC0aWx+LOoDDygLt3YI0Yn5YP7Z+P8nU2fLwHN+JoNcJjgntXyzrL:uqZFQt0n2OozVfH5X8nU2fkHN+u2i5yr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-