General
-
Target
dbcf1ee89f2f1772a4254bc84308b186e2b4279c363b7063e801215e339c373a
-
Size
1.4MB
-
Sample
240606-cwg85aff89
-
MD5
cb5775e2c93925fa0af65ef16f54da08
-
SHA1
e4f785f45a6bf81996278872eca195fd4ce81ce2
-
SHA256
dbcf1ee89f2f1772a4254bc84308b186e2b4279c363b7063e801215e339c373a
-
SHA512
46facc22dbda6e3e43323f1cdfdc3980cdbf786e005c63b73e4d72be3f904cea924d03d3b2113b045b7218a66c6d2abfa42a71586b6992a9c1bf3ff437684c80
-
SSDEEP
24576:Z6OZli7Eeyq5BpQj+RQIOlYjJfph1i1q:Z6XEe7kj+RQIO4Lh1P
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY FOR TI ORDER IN HAND.exe
Resource
win7-20240508-en
Malware Config
Extracted
Protocol: smtp- Host:
shared167.accountservergroup.com - Port:
587 - Username:
[email protected] - Password:
Stanley @123#
Extracted
agenttesla
Protocol: smtp- Host:
shared167.accountservergroup.com - Port:
587 - Username:
[email protected] - Password:
Stanley @123# - Email To:
[email protected]
Targets
-
-
Target
INQUIRY FOR TI ORDER IN HAND.exe
-
Size
914KB
-
MD5
be162a79f5b63797e12633d22e2be636
-
SHA1
45013c639574e42626d90695397556af763d6320
-
SHA256
cd99bbc0a0e633dc0aeefd6d10248559f9fd295b77b05989834f75364596c968
-
SHA512
89c777b2f267d0cb2c242e5e4a32099a6fbb0e5ac7437a2f918ce4a2ab74b7196012cb6e31039087d80498d425b802ff1e9c22953c53362d3894bccea891db58
-
SSDEEP
24576:q6OZli7Eeyq5BpQj+RQIOlYjJfph1i1q:q6XEe7kj+RQIO4Lh1P
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-