General
-
Target
purchase order 21029.exe
-
Size
718KB
-
Sample
240617-qwth2stanb
-
MD5
d78328c74038f352a3fc925869c72a6f
-
SHA1
40add36f173997516722233a7f77e6d5820059a0
-
SHA256
67478aaae5e89afc20d6e29500da5a1a3a9c266976a4aae255fe9ebbe4aeef58
-
SHA512
f0931df42e13e5ce3b77d5cde4532dc21cfe5cc1625b89eab5992687d33ece3baddda95d45ade93ca401605163be2990af8eb6ffccd926fd7154e5e593d7468e
-
SSDEEP
12288:hxK2iNPyCK2xrOomU7kmHS3fbjX3GQDwcpgPGEgA3ltVHkPcoN7QHNqSTmG:O15yC5m4SvbjX398td3ltVVoN7QHNqSP
Static task
static1
Behavioral task
behavioral1
Sample
purchase order 21029.exe
Resource
win7-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.winnerawards.ae - Port:
587 - Username:
[email protected] - Password:
azharwinner - Email To:
[email protected]
Targets
-
-
Target
purchase order 21029.exe
-
Size
718KB
-
MD5
d78328c74038f352a3fc925869c72a6f
-
SHA1
40add36f173997516722233a7f77e6d5820059a0
-
SHA256
67478aaae5e89afc20d6e29500da5a1a3a9c266976a4aae255fe9ebbe4aeef58
-
SHA512
f0931df42e13e5ce3b77d5cde4532dc21cfe5cc1625b89eab5992687d33ece3baddda95d45ade93ca401605163be2990af8eb6ffccd926fd7154e5e593d7468e
-
SSDEEP
12288:hxK2iNPyCK2xrOomU7kmHS3fbjX3GQDwcpgPGEgA3ltVHkPcoN7QHNqSTmG:O15yC5m4SvbjX398td3ltVVoN7QHNqSP
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-