General
-
Target
cb0a75d00fa97462bb89a0be5fac87de4803c5b61755092253c7cf9af6e40fbe
-
Size
383KB
-
Sample
220520-2v4s6sbagk
-
MD5
d3086ac2616df83859239431e24b14e1
-
SHA1
923147739dac2979092c33ce4f4470c2a34eeb16
-
SHA256
cb0a75d00fa97462bb89a0be5fac87de4803c5b61755092253c7cf9af6e40fbe
-
SHA512
34dff77e77538d557301c50dfc0e96516c3fb411de3d14e3c785dedb722df7c47254a67dba3df0a670550820dfb8d7e7da64eb738176bccb56833e56f11d83c6
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Shipping Documents.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
ikechukwu112
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
ikechukwu112
Targets
-
-
Target
Shipping Documents.exe
-
Size
425KB
-
MD5
9def0c53033f12c2c2d5bc429fcfa887
-
SHA1
38172df5f24838ea85074eec4194d8f6a67d591d
-
SHA256
48c961dc9ce3260ac71aedb77eb999606e804d7563d6877d26c12f7cb57860d3
-
SHA512
03264ba3e4fb97c5f94fd42f8ea153e7b85805f4ab5bff1c0d9ff9e8980a3ab4edc4f8479a81d99b0a039a4a079831a73d58ea90d0a3f51351d9d802035220c2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-