General
-
Target
RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
-
Size
380KB
-
Sample
240508-jcd6pahd2z
-
MD5
c35a5008193e77c7afdf53d7fcc20f37
-
SHA1
1547e797fc8dfebe43591583b7f8c5d130eafc77
-
SHA256
b4702b8caff8174aa2faaf8f2e963d6ae79beee73054747db74b2cc21997885c
-
SHA512
1658f60e7a7813c52927ff025ef26381da54a75c0a505ca271940f1dd02503510476eddedcbd9f44dc56d2dad27c32da4eaf21bd4ae71a23fd04131578ec861b
-
SSDEEP
6144:IUj/wCLmZS6+GpBAcbO0gDKeD8Wk4ubDWSOeij1aNltfkafgIxhQ5Y8HndM7zgD4:Iqfmc6+GTASWjkx5OeScNL7hQ5DHnC+4
Static task
static1
Behavioral task
behavioral1
Sample
RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.zoho.eu - Port:
587 - Username:
[email protected] - Password:
office12# - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.zoho.eu - Port:
587 - Username:
[email protected] - Password:
office12#
Targets
-
-
Target
RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
-
Size
380KB
-
MD5
c35a5008193e77c7afdf53d7fcc20f37
-
SHA1
1547e797fc8dfebe43591583b7f8c5d130eafc77
-
SHA256
b4702b8caff8174aa2faaf8f2e963d6ae79beee73054747db74b2cc21997885c
-
SHA512
1658f60e7a7813c52927ff025ef26381da54a75c0a505ca271940f1dd02503510476eddedcbd9f44dc56d2dad27c32da4eaf21bd4ae71a23fd04131578ec861b
-
SSDEEP
6144:IUj/wCLmZS6+GpBAcbO0gDKeD8Wk4ubDWSOeij1aNltfkafgIxhQ5Y8HndM7zgD4:Iqfmc6+GTASWjkx5OeScNL7hQ5DHnC+4
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
a4dd044bcd94e9b3370ccf095b31f896
-
SHA1
17c78201323ab2095bc53184aa8267c9187d5173
-
SHA256
2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
-
SHA512
87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
SSDEEP
192:em24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlESl:m8QIl975eXqlWBrz7YLOlE
Score3/10 -