General
-
Target
INVOICE and DETAILS.zip
-
Size
603KB
-
Sample
231212-qewl3sdddq
-
MD5
516e0089f8b70e7848055d604e388d94
-
SHA1
b79bf21a39b97a3274bc1797a479b8099f2f68a7
-
SHA256
76b402a31a8cd4ee98a898f093d337f47c5e799baf0e2a00d127be0e37433bca
-
SHA512
71fdedae7f70b4510888aad5fdcb23b137bc4fbf31a2f4a89bb92a77d20c03a0920d6a6a66bd66b50b91622478ce0a1213c3d464792460345a053d71d89f8e5e
-
SSDEEP
12288:Vx4FtwyU99jZM8kAZSVuI4lNd/Vb8E+NHAkEgPadgZvpUt:4FeyUfWy9Iodbh+NHAkEgSdgZ2t
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE and DETAILS.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
INVOICE and DETAILS.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.precise.co.in - Port:
587 - Username:
[email protected] - Password:
Singh@2022$ - Email To:
[email protected]
Targets
-
-
Target
INVOICE and DETAILS.exe
-
Size
621KB
-
MD5
12528895f0306755c4fdee8ba97d89d1
-
SHA1
408636fe1438ba5f210705057beaf9a746ea83f6
-
SHA256
4dd2869a36c4b826221c8b8131503fd48d3e8871af1ba2405823947c9915de74
-
SHA512
b139b1a7d08833490e4fa3872391a4b953e0fd97700e46315d86ac41243368b02c3de1d36621e1b9e430018867a9b0211fc48a7c9d1a68cc17af685ce18cb0c7
-
SSDEEP
12288:L3IU8S6eUdsQKwNsP4xcI1MJwNfA/R4lPd5V18EENHSkkEDWYAj:7ItSAdsQK3I1RNfA/RwP1hENHSkkEKD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-