General
-
Target
Purchase Order 4500039272 Approved.7z
-
Size
287KB
-
Sample
231207-nbes2shh55
-
MD5
2ae361dad1cb28293d8b181d3866185b
-
SHA1
164a4bb62f026b3522e1e74f05212456fb762d74
-
SHA256
54497205fe92f27ffc0f6dfc41d9c6af69976ac4470bb65957deb035b0e6b6a3
-
SHA512
b895b2e3c662cbc780c337e261329097a6b60ccc96002ce67b73fe99a8f35385c3794be3c93059046a90d09afb5e0d50afe324869c0de7c3544525c0b26d2580
-
SSDEEP
6144:kXqOq4tpXRlY5FUfFhkmbNdBfgNfcTyO4XQjzQ6LbHLSy0lCg:k6Oq0BmUthkGbB3eOhzxLbr/0l
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order 4500039272 Approved.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Purchase Order 4500039272 Approved.exe
Resource
win10v2004-20231201-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bezzleauto.com - Port:
587 - Username:
[email protected] - Password:
Kene123456789 - Email To:
[email protected]
Targets
-
-
Target
Purchase Order 4500039272 Approved.exe
-
Size
347KB
-
MD5
5cef4d15bae43132b36b2db81601aa16
-
SHA1
58ad81c84ec579dc5e15b1b84a4939d398f97481
-
SHA256
9f468e738ac7218f377e20302bedf378c573b15e54f46b786e4a6b5a2081fc8b
-
SHA512
33ff6dbb8e0abe7af5951abcf820f162b718825f716038c22c15f552f1a83097d32ed36f616f9b9a26859e4afcefaa86508b8ffbff1b3748fb08b78ae960588f
-
SSDEEP
6144:p0T5IUfFhkWbNyNffNfcTyg4XQdzQ9A185RDhq+2t55VEub:ppUthk2YNiegnzJ1ADhq1/9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-