General
-
Target
503ac480dd48ab2147487f06e2394b759631512866aa0284d03d1c69c4861264
-
Size
778KB
-
Sample
240521-cbjlfseg5y
-
MD5
5ed9ce7b3e450c9a9d0f18af3e5bb51b
-
SHA1
b6406655f3a58582b44bc688563451e4d959c0b3
-
SHA256
503ac480dd48ab2147487f06e2394b759631512866aa0284d03d1c69c4861264
-
SHA512
6da68877e7fc655b7b0a01eafc622748d4a367b49adc04e0a0d2eb1f6582df6960f013f0cb45a83645a8eb55c338442eaa37becef18f437ecab0838372e1b19f
-
SSDEEP
24576:fWt3x6bylhVYLVJ907edRrKjeayxMTeb:unVc7dRrKCOTeb
Static task
static1
Behavioral task
behavioral1
Sample
PO 76063675443-June Order list.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
ifeanyi@12 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
ifeanyi@12
Targets
-
-
Target
PO 76063675443-June Order list.exe
-
Size
716KB
-
MD5
cd3d96bf2cdd57e03fa908166592ae2e
-
SHA1
23df570704219bb1f7142e5c84c463b38b6fa30f
-
SHA256
b6d7a0644eb168856fec62e2958b076f7230dafcd655b14f53b3f5813e7cfd62
-
SHA512
3ffcb82ccb9a34d2f6babef13c7ebb7ae57893f95c6c74d5f1b1ea9276f3a51542350d43116d455eebd7e6183fb53440d0db2cfebe56579fba607e19acb0db3a
-
SSDEEP
12288:vWET/mr9KGp318ksbyll71co8X25f/zV83LVJ907fUiSd1HdhKHZle1VCXixwVSk:vWt3x6bylhVYLVJ907edRrKjeayxMTeb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-