General
-
Target
Urgent Request for Price Quotation.r00
-
Size
628KB
-
Sample
240723-l94hyszhqf
-
MD5
1663ef1daf29904cf83392a9b1c62aa5
-
SHA1
7e275a110ef4003e1aeb22771295669feaf2fa94
-
SHA256
74ef3f0a92c7d79145af655f0c56cd660b6eed93d4399d7c229dde68b0eac2a5
-
SHA512
0b071900d6f31996a77f223880e6fff70d7dc88611de7c4454e69c87304f6ee7d475c851548b5f0147b12e97c3d1cfb7c107d4f3435bffd76787c9246b5d87eb
-
SSDEEP
12288:NQQeLNY+YbHyXvKDBaq/tRU7Bq9j8UVT1Jx6vZhhHFeeZXw9w4iw:iQei+4SXvKDBb/tQq9jpTfx6vZIeO9X
Static task
static1
Behavioral task
behavioral1
Sample
Urgent Request for Price Quotation.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.commtechtrading.com - Port:
587 - Username:
[email protected] - Password:
;elP@ho2Np 7[ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.commtechtrading.com - Port:
587 - Username:
[email protected] - Password:
;elP@ho2Np 7[
Targets
-
-
Target
Urgent Request for Price Quotation.exe
-
Size
658KB
-
MD5
6b6ef935d78cc58252420afaac8cd3dd
-
SHA1
e204d7538c2d11650fdbbe7317c8d2c60091df8b
-
SHA256
d22ba564b79465fff584d41655b8bd84e6bf0046b30d371cc2ccc5adc08e5a84
-
SHA512
d6e1f68a2080c01c4114dab2e046b754e6cbb672261074479d44e368ccb07fedff8009a964c9ed270281b9c6b2acd9180bbd2251661d0c229d40834aa6753b7f
-
SSDEEP
12288:PPDzsiDHT4Lo575PEadgBmrvsLkAEtpQoQv+RAy9vxiSv:PPDDi475YMvIfEtpQRv+RNN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-