General
-
Target
Purchase Order 4500039272 Approved.exe
-
Size
347KB
-
Sample
231207-m4j3sshg56
-
MD5
5cef4d15bae43132b36b2db81601aa16
-
SHA1
58ad81c84ec579dc5e15b1b84a4939d398f97481
-
SHA256
9f468e738ac7218f377e20302bedf378c573b15e54f46b786e4a6b5a2081fc8b
-
SHA512
33ff6dbb8e0abe7af5951abcf820f162b718825f716038c22c15f552f1a83097d32ed36f616f9b9a26859e4afcefaa86508b8ffbff1b3748fb08b78ae960588f
-
SSDEEP
6144:p0T5IUfFhkWbNyNffNfcTyg4XQdzQ9A185RDhq+2t55VEub:ppUthk2YNiegnzJ1ADhq1/9
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order 4500039272 Approved.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
Purchase Order 4500039272 Approved.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bezzleauto.com - Port:
587 - Username:
[email protected] - Password:
Kene123456789 - Email To:
[email protected]
Targets
-
-
Target
Purchase Order 4500039272 Approved.exe
-
Size
347KB
-
MD5
5cef4d15bae43132b36b2db81601aa16
-
SHA1
58ad81c84ec579dc5e15b1b84a4939d398f97481
-
SHA256
9f468e738ac7218f377e20302bedf378c573b15e54f46b786e4a6b5a2081fc8b
-
SHA512
33ff6dbb8e0abe7af5951abcf820f162b718825f716038c22c15f552f1a83097d32ed36f616f9b9a26859e4afcefaa86508b8ffbff1b3748fb08b78ae960588f
-
SSDEEP
6144:p0T5IUfFhkWbNyNffNfcTyg4XQdzQ9A185RDhq+2t55VEub:ppUthk2YNiegnzJ1ADhq1/9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-