General
-
Target
addb01ee4d8af56ab5d80f68318311d3c4be44e8c55b97fbaa3cc4b792130c33
-
Size
1.3MB
-
Sample
241017-b1hj1sydmq
-
MD5
568e7fa2e410f9cbf0820770f1e7bbae
-
SHA1
1bcf238996b17d8ae18c2cabc8b76388d08ac026
-
SHA256
addb01ee4d8af56ab5d80f68318311d3c4be44e8c55b97fbaa3cc4b792130c33
-
SHA512
4deb8f9d2597f7aa3dfe21498dc4486cf7fa7ad06068c0f0b79281d54e678c2acaf06c8fa80ffd9d20613c3a929e169c8d308f197bbfa1e3cfa88ee4f871923f
-
SSDEEP
24576:s6hNCs0+rObdheGqQgJF8BexanHnczyUP0eexX5Ccm1inDnmza:s6acmhe0gboi08z7P0xxX5Lm1inDnmza
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Targets
-
-
Target
Purchase order.exe
-
Size
1.4MB
-
MD5
4c363afc82b0757d2723ff1287ab85de
-
SHA1
eae78234d3125edb5e161641b1c61dfab9456a46
-
SHA256
0787749d9897612314975e2943139157efcff4dbf604323d3d950c76b7555719
-
SHA512
c202cb6c3b8bef7cb556c335595c03e7da412e00466491e3bbbec15391bec8250d944ada1eb4b4e5d6215d39c2f28996a025a6de78243570382cf188744d8ac3
-
SSDEEP
24576:szSWNKs08nmbdXiQsGgJF2B+xaJ/ncPUoN0eaxn7wymHinDVw2iTYYuX0J:gSPGyXi0gbKCikPPN0fxn7NmHinDVw2e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1