General
-
Target
New-Order20240303.exe
-
Size
858KB
-
Sample
240305-ftbv4sfb2y
-
MD5
f7a480f48e808a493a91f31b8a72d20a
-
SHA1
1f4f44e0feb5166eb107c0a7e9fd1b0f921db9e2
-
SHA256
e90f22b601bafbd637700fa9338a4adb4413b8e7944941403560d11ca7997618
-
SHA512
b38ca542d172c1dd755a35df2d44de9466cb1ed681506b58953f7c63154e3c22a1fcea9a125bdd4931294d6d7c408a051269e039cf131968fdac53aa85c6fbcb
-
SSDEEP
12288:iI9M+GHzN8KquCQq9RPf+Dvc5ppSWzzt/i3c/wfFTumO1dspX9W:FezWVxNWvep/zztKM0L0dspX9W
Static task
static1
Behavioral task
behavioral1
Sample
New-Order20240303.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
New-Order20240303.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.ztmfbih.ba - Port:
587 - Username:
[email protected] - Password:
jasmin.tafro
Extracted
agenttesla
Protocol: smtp- Host:
mail.ztmfbih.ba - Port:
587 - Username:
[email protected] - Password:
jasmin.tafro - Email To:
[email protected]
Targets
-
-
Target
New-Order20240303.exe
-
Size
858KB
-
MD5
f7a480f48e808a493a91f31b8a72d20a
-
SHA1
1f4f44e0feb5166eb107c0a7e9fd1b0f921db9e2
-
SHA256
e90f22b601bafbd637700fa9338a4adb4413b8e7944941403560d11ca7997618
-
SHA512
b38ca542d172c1dd755a35df2d44de9466cb1ed681506b58953f7c63154e3c22a1fcea9a125bdd4931294d6d7c408a051269e039cf131968fdac53aa85c6fbcb
-
SSDEEP
12288:iI9M+GHzN8KquCQq9RPf+Dvc5ppSWzzt/i3c/wfFTumO1dspX9W:FezWVxNWvep/zztKM0L0dspX9W
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-