General
-
Target
profoma invoice.exe
-
Size
713KB
-
Sample
240522-gjrn9aeb6z
-
MD5
205115d53c09553975ebe093dac461b2
-
SHA1
e62dcafe6d96b592151c93b75544b3c211b238a6
-
SHA256
cbf14746622e54452570f3b6b620d0831c788c28c8bbb0a1f6cb17746e4973ef
-
SHA512
30ebce57a1ac51a4506e6fd2cba0e907738700d3670b07a9bc0510908b5aabdb0eb0fc08b1f0713f7dd0912d9284da94ec2979b4e22481eb720cb67a67f0f0e0
-
SSDEEP
12288:mTReLAfP7wDj3ZiCx2D3Flbl0VzyLqSjaKIYiYP7x31gCrRowa3LlGqbjGU9+yF:4537wDjUxlZ05yLDaKIfYP7RaCNuBGqN
Static task
static1
Behavioral task
behavioral1
Sample
profoma invoice.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
profoma invoice.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ipr-co.org - Port:
587 - Username:
[email protected] - Password:
IPRco@100102@ - Email To:
[email protected]
Targets
-
-
Target
profoma invoice.exe
-
Size
713KB
-
MD5
205115d53c09553975ebe093dac461b2
-
SHA1
e62dcafe6d96b592151c93b75544b3c211b238a6
-
SHA256
cbf14746622e54452570f3b6b620d0831c788c28c8bbb0a1f6cb17746e4973ef
-
SHA512
30ebce57a1ac51a4506e6fd2cba0e907738700d3670b07a9bc0510908b5aabdb0eb0fc08b1f0713f7dd0912d9284da94ec2979b4e22481eb720cb67a67f0f0e0
-
SSDEEP
12288:mTReLAfP7wDj3ZiCx2D3Flbl0VzyLqSjaKIYiYP7x31gCrRowa3LlGqbjGU9+yF:4537wDjUxlZ05yLDaKIfYP7RaCNuBGqN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-