General
-
Target
21e5714c80ac1434826b55931e58a1d8eb82d62970cfabb44a268d0adca87ecc
-
Size
416KB
-
Sample
220521-dwfkzabddn
-
MD5
9a724cce9d88dd96508beff4ccb32f47
-
SHA1
e46f86ed756c2c9b58c011495f65157b7d5274d4
-
SHA256
21e5714c80ac1434826b55931e58a1d8eb82d62970cfabb44a268d0adca87ecc
-
SHA512
e3f4236d09ba0219f6db69d994c6d54d1afa4b5ec39187c4cec9e5dfa17f4f7d326d51d160faf1d0a02ad701e90b2714cd7ab530d0d21b95179d0a17843ef038
Static task
static1
Behavioral task
behavioral1
Sample
Shipment Notice.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Shipment Notice.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cpcl27.hostingcare.net - Port:
587 - Username:
[email protected] - Password:
Standard123#@!
Targets
-
-
Target
Shipment Notice.exe
-
Size
471KB
-
MD5
5246dcb8944246a4d922e39647ba6e34
-
SHA1
51c412f7294013b83137ed5773652b80cb88c9d5
-
SHA256
2c96b6799b4a15f6cd01ae6aabae3181b13d128b7b085854c77ee71253139040
-
SHA512
7627724250c7ee7f0a1363bd467eaa291bd1909da5534935761f4c7cc5d0a1b1e961b1bcee0fe0199b3bbc99bd063cfd5e29206c65f4e8fe60d9adb6d5e26ca0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-