General
-
Target
Shipping documents.exe
-
Size
1.1MB
-
Sample
221123-rm8r2sca71
-
MD5
f683d81b0a64bbd11cf5f21ec12da54c
-
SHA1
646df1c5b6d45e01e1e042ffe9e46f820ecc5b4c
-
SHA256
c018bc22c700a8f6e4100b843d3a96b2409d6c215e1062608fd73714236764fd
-
SHA512
8dc81a8a3df22fdacaf3baa5e8226de0087f9d7a80d9ffd4015b3407e3e534e03027d0b1a5960f25972b995c54ffd52780c9483bdb07cdde17e79a0b3578980c
-
SSDEEP
24576:PGIGAA2Jim+0u1zHoVXGkQgylZUcHfOVjqdOpd:eGJJhLu1rcGkKd4jqdO
Static task
static1
Behavioral task
behavioral1
Sample
Shipping documents.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Shipping documents.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.biateknos.com - Port:
587 - Username:
[email protected] - Password:
biateknossutinah - Email To:
[email protected]
Targets
-
-
Target
Shipping documents.exe
-
Size
1.1MB
-
MD5
f683d81b0a64bbd11cf5f21ec12da54c
-
SHA1
646df1c5b6d45e01e1e042ffe9e46f820ecc5b4c
-
SHA256
c018bc22c700a8f6e4100b843d3a96b2409d6c215e1062608fd73714236764fd
-
SHA512
8dc81a8a3df22fdacaf3baa5e8226de0087f9d7a80d9ffd4015b3407e3e534e03027d0b1a5960f25972b995c54ffd52780c9483bdb07cdde17e79a0b3578980c
-
SSDEEP
24576:PGIGAA2Jim+0u1zHoVXGkQgylZUcHfOVjqdOpd:eGJJhLu1rcGkKd4jqdO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-