General
-
Target
Purchase Order.5643.exe
-
Size
1.5MB
-
Sample
240118-jklwhafcfj
-
MD5
ea2d5c4a8b18baa2b176bcf1081ed78f
-
SHA1
3cd6d04fc855d0363552c2819b5494c3099256dc
-
SHA256
d5733b86891cf1507cbbc97b0cef0280175d40bf946eea3d302ec19d6ed38369
-
SHA512
af0dfc8df6fbf60a28b0ce6d5c1f2de09dd2490b1827f1dd087e6e7afc75e5f00de219f69a954fd8338b3a24551dc2477fc28eb23e0213cb92b1c10afda2c2ec
-
SSDEEP
24576:aWaS+JEfphxW553sSntC6s+6qbU0saooQaPSMdLAWqY8fWFEIJ3VUPvymws5IgZs:WS+axysYC6syUkoPaPS2AJNyxUP+Mk
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.5643.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Purchase Order.5643.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cornery.com.my - Port:
587 - Username:
[email protected] - Password:
Market321* - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.cornery.com.my - Port:
587 - Username:
[email protected] - Password:
Market321*
Targets
-
-
Target
Purchase Order.5643.exe
-
Size
1.5MB
-
MD5
ea2d5c4a8b18baa2b176bcf1081ed78f
-
SHA1
3cd6d04fc855d0363552c2819b5494c3099256dc
-
SHA256
d5733b86891cf1507cbbc97b0cef0280175d40bf946eea3d302ec19d6ed38369
-
SHA512
af0dfc8df6fbf60a28b0ce6d5c1f2de09dd2490b1827f1dd087e6e7afc75e5f00de219f69a954fd8338b3a24551dc2477fc28eb23e0213cb92b1c10afda2c2ec
-
SSDEEP
24576:aWaS+JEfphxW553sSntC6s+6qbU0saooQaPSMdLAWqY8fWFEIJ3VUPvymws5IgZs:WS+axysYC6syUkoPaPS2AJNyxUP+Mk
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-