General
-
Target
purchaseorder.exe
-
Size
1.1MB
-
Sample
241017-kgehpatbqn
-
MD5
153eee5e101ec857b140cca87f264d80
-
SHA1
e879c0ccbc0d7ed39cc91f9dd3ad9e89cf06594b
-
SHA256
0d7a4a69f12914329cbff3ca263858dac70c0b5afa1657806129e553fd9e246e
-
SHA512
0c16b298bf3220a3f39eded3727bb5b9a0a6cd5dbe41d6befdba9ad20b6979ff8fc9929282f41049e298c8f9e5e5dcf207f4a8915f755286b8c2d7674b8ce68d
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLki/z3093nfJQuXYXxLEnG:f3v+7/5QLj/g9fJQ9Bf
Static task
static1
Behavioral task
behavioral1
Sample
purchaseorder.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
purchaseorder.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.starmech.net - Port:
587 - Username:
[email protected] - Password:
nics123 - Email To:
[email protected]
Targets
-
-
Target
purchaseorder.exe
-
Size
1.1MB
-
MD5
153eee5e101ec857b140cca87f264d80
-
SHA1
e879c0ccbc0d7ed39cc91f9dd3ad9e89cf06594b
-
SHA256
0d7a4a69f12914329cbff3ca263858dac70c0b5afa1657806129e553fd9e246e
-
SHA512
0c16b298bf3220a3f39eded3727bb5b9a0a6cd5dbe41d6befdba9ad20b6979ff8fc9929282f41049e298c8f9e5e5dcf207f4a8915f755286b8c2d7674b8ce68d
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLki/z3093nfJQuXYXxLEnG:f3v+7/5QLj/g9fJQ9Bf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-