General
-
Target
08052024_0319_07052024_Request for quote_PO-240102.pdf.z
-
Size
676KB
-
Sample
240508-dva9vsga4x
-
MD5
3672a85768f94630bb1656da3a7fde3d
-
SHA1
73d26874d81416742c32455c441c5bbf1ba9fa67
-
SHA256
bd9128205fb890e1c7b9a29b28e9976ae4b545e1034c314804b4854544707223
-
SHA512
5d7462f8392a4eb46aab6b9adee396b398da2ab8a263b41488285c8ae4cd91e1874d31acfcc3cef083676a44ee6a6c844222dd9c79d336ecd16e33e1ee2a1fcb
-
SSDEEP
12288:+oMX3WmPvYLYI3M/LHLgWxHW1Lfkg45xU0nkqLrUWQiKBP0rneT//:cGigUqM/fxHW14zrnDLxmBSg/
Static task
static1
Behavioral task
behavioral1
Sample
Request for quote_PO-240102.exe
Resource
win7-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
dKjVwpK4 dKjVwpK4 dKjVwpK4 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
dKjVwpK4 dKjVwpK4 dKjVwpK4
Targets
-
-
Target
Request for quote_PO-240102.exe
-
Size
722KB
-
MD5
ca91c42a8f1efc6763c7da3d28371f0f
-
SHA1
f777b12bedb4606df5d06bd3c6fd5bbdf960d436
-
SHA256
cd8c76f494fa0be5e4267c0552f32fccef575a76801d7b2f01fadc382d589118
-
SHA512
1ac057c224101285916062d7a7f64f1ab2e37e9e4addfbf06c60d4209e20be52b2613ee15f96f05b3f440ee2f5eef4aef1f8100d6cdd9f6159ec6a99289faaee
-
SSDEEP
12288:LTrv2iNj/SHl/T7BA2N5MGCp0OzD2GLqYQiq9VgxpvnQxXoVb/xhfIItWo:Ln1cHtnBNNyGCp3/qYQiq9VEvnQxXobV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-