General
-
Target
Shipping documents.exe
-
Size
643KB
-
Sample
221124-lcgb6agf9z
-
MD5
36ad0d4a388265a5c56f4f44521f7e02
-
SHA1
4bfef5be1eeb772e7a9e1003765678c5c9613ba7
-
SHA256
86bff0f6efa102b2aad9d7dd04f9644fbc7a6c13992742de8f310bca8f39655d
-
SHA512
ffa616d6a0f34b77fb64da3d74f483448c631fbb9e8f5e1aa5704e50def974997954175858ddd3279fd652752829ec4b18695e6bdb1e3a02db0942fcad3a21ab
-
SSDEEP
12288:c/GKu62z/pI+XYay63k1ABfUnirNFpLMCLw+eyS/haQctCl39Yszbta/HxovpVTF:D66VYay6cuUiLLMsey2ha1MXzhKWjF
Static task
static1
Behavioral task
behavioral1
Sample
Shipping documents.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Shipping documents.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.biateknos.com - Port:
587 - Username:
[email protected] - Password:
biateknossutinah - Email To:
[email protected]
Targets
-
-
Target
Shipping documents.exe
-
Size
643KB
-
MD5
36ad0d4a388265a5c56f4f44521f7e02
-
SHA1
4bfef5be1eeb772e7a9e1003765678c5c9613ba7
-
SHA256
86bff0f6efa102b2aad9d7dd04f9644fbc7a6c13992742de8f310bca8f39655d
-
SHA512
ffa616d6a0f34b77fb64da3d74f483448c631fbb9e8f5e1aa5704e50def974997954175858ddd3279fd652752829ec4b18695e6bdb1e3a02db0942fcad3a21ab
-
SSDEEP
12288:c/GKu62z/pI+XYay63k1ABfUnirNFpLMCLw+eyS/haQctCl39Yszbta/HxovpVTF:D66VYay6cuUiLLMsey2ha1MXzhKWjF
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-