General
-
Target
commercial invoice-AD1-2001028L.7z
-
Size
2KB
-
Sample
221123-kbabsacb7y
-
MD5
e59855e2e039995dd9f6567b29a9f629
-
SHA1
8b027f3acf1dd8b0ea775316af302ec05d1e189d
-
SHA256
c2f3e70421ccff4ebd8f81672079ebd556617048c57ef949011b2282e3124e47
-
SHA512
92a40f7521bb2928a831131b8b7d62946874b90af76de1f06a2f7fb49a5124c476d5dee6aabd5c32454ab77c7648120249ae74774a2058206a132cc50149b5cd
Static task
static1
Behavioral task
behavioral1
Sample
commercial invoice-AD1-2001028L.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
commercial invoice-AD1-2001028L.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rimiapparelsltd.com - Port:
587 - Username:
[email protected] - Password:
Everest10@ - Email To:
[email protected]
Targets
-
-
Target
commercial invoice-AD1-2001028L.exe
-
Size
6KB
-
MD5
8d936312a59afa52e18a4d665755690d
-
SHA1
aa34c27cdf073eb5c54e371714d3d68a626bbbd8
-
SHA256
ee511bade3822feb689576b65cb3e490e9459c11c5b6583b36920f742c1bd99d
-
SHA512
b36924fe5af405e6447fbf01d6d9c75cfe9dc335e36b64ea8982e59a1d9ac48dde4855f5c84cdcc21fb4d4dcbbfca1e485bbd32f04b10d67c1dc577aab9abd65
-
SSDEEP
96:awqkGAzKfGe7DVys+BWfik85EOd/vSGQeMFnU:N4DUDEPYEOdES
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-