General
-
Target
bc7a5671fa742711775708fb79992eaad8427177e7de2facc98fc16e3fc3570c.ace
-
Size
681KB
-
Sample
240523-q4v2vadc2y
-
MD5
4561eeaf84b7ce489765deeadd47e559
-
SHA1
eaeb5703f3efa4518aff0d60e0b8c0f66f03c6d4
-
SHA256
bc7a5671fa742711775708fb79992eaad8427177e7de2facc98fc16e3fc3570c
-
SHA512
2d75be5110431837adc50515047947951c6d85095e39bc15ac6a8f5c3060a8d2afe49f2c7ec4443abf6c891dd3dace2d4080acbe98553b504faf6eb9132c37c4
-
SSDEEP
12288:ft9LAL7lCB7Xoa7XrgKtKu4W//A/y6P2+qRxGgbZ0DjXrVt5JzEUa1Pest/s0DIu:V9kL7UrTtWg/ivOLAgyfXhBEUa0O/BUu
Static task
static1
Behavioral task
behavioral1
Sample
New Order1.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.manpowerchannel.com.sg - Port:
587 - Username:
[email protected] - Password:
plyj183005 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.manpowerchannel.com.sg - Port:
587 - Username:
[email protected] - Password:
plyj183005
Targets
-
-
Target
New Order1.exe
-
Size
758KB
-
MD5
793bcb19f56e8ffbb2df4f0cf09e6989
-
SHA1
36a6f3001ccb22e2a542fc190ca2187f0a170e8c
-
SHA256
0d8d3c58ed2996ce243b68034817ded7fc06e4bd2a79e367f72f2020a35214d5
-
SHA512
79dadb42684d8a10d5c2269149462e4647f2ada4eb2d6ef7a0c571d6a89a2dfd87fba1e1b9a50b5078fa3cdffb582b27160aa6024f9518ade893daf8e94c7735
-
SSDEEP
12288:LIcWET/mr9K+22BEEzFatnZ4SK408Jr0C0hmm/SJQvtK8MNAVsCvCRPTNDD6/IhG:xWtb3BEBx70hm2sQvtK8nswCRPZDO/xz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-