General
-
Target
purchase orders.exe
-
Size
407KB
-
Sample
231207-j135qagb52
-
MD5
e9f8fff3341f84d5f76570fd5068b8b5
-
SHA1
7daebfd9193ff0c4925523d470d71ff12d692f98
-
SHA256
86608bbc9a9aa6e01636680205ef421bc37aeff7312960a821989f1eea7b3540
-
SHA512
80fcd35320752592e7e163b5d50df19c01d061596bc411e0de7a666c156f28973b11fc8760c56a64382b22ddaf2c6aa05092ba1aba496970a0afcf7e6ed935ec
-
SSDEEP
12288:D9WEeYF2adf4qD7Wz+oHvu7oUgLCPj4tF2:D9WEeJhM35UUGAwU
Static task
static1
Behavioral task
behavioral1
Sample
purchase orders.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
purchase orders.exe
Resource
win10v2004-20231130-en
Malware Config
Targets
-
-
Target
purchase orders.exe
-
Size
407KB
-
MD5
e9f8fff3341f84d5f76570fd5068b8b5
-
SHA1
7daebfd9193ff0c4925523d470d71ff12d692f98
-
SHA256
86608bbc9a9aa6e01636680205ef421bc37aeff7312960a821989f1eea7b3540
-
SHA512
80fcd35320752592e7e163b5d50df19c01d061596bc411e0de7a666c156f28973b11fc8760c56a64382b22ddaf2c6aa05092ba1aba496970a0afcf7e6ed935ec
-
SSDEEP
12288:D9WEeYF2adf4qD7Wz+oHvu7oUgLCPj4tF2:D9WEeJhM35UUGAwU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-