General
-
Target
Shipping documents.exe
-
Size
461KB
-
Sample
221125-f25hdsde78
-
MD5
893aeb0f5f4438e2748e580c130e100f
-
SHA1
f45b94c1568625c4b3507ea6c37c70a35344cad7
-
SHA256
b51a2616cda21a22be90fe6587e67a44675ee5daf65dcc18bb1516a09090bc43
-
SHA512
6e0e1f47debf1ebb1668c96c24dc1fe1dc5eaa9aaa2e9e27cd80df3c3f1fdabc7b414e0c0974e20a8fa09390e6ab6b15f645f905828617577f041f2e24a9f1f2
-
SSDEEP
12288:HtQQXMENB9eh32XY7H/kiMpCJhnfZVCR4an2PAa:HuYGzkiMsJhnfG4a2PAa
Static task
static1
Behavioral task
behavioral1
Sample
Shipping documents.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Shipping documents.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.dms-est.com - Port:
587 - Username:
[email protected] - Password:
ab7865
Extracted
agenttesla
Protocol: smtp- Host:
mail.dms-est.com - Port:
587 - Username:
[email protected] - Password:
ab7865
Targets
-
-
Target
Shipping documents.exe
-
Size
461KB
-
MD5
893aeb0f5f4438e2748e580c130e100f
-
SHA1
f45b94c1568625c4b3507ea6c37c70a35344cad7
-
SHA256
b51a2616cda21a22be90fe6587e67a44675ee5daf65dcc18bb1516a09090bc43
-
SHA512
6e0e1f47debf1ebb1668c96c24dc1fe1dc5eaa9aaa2e9e27cd80df3c3f1fdabc7b414e0c0974e20a8fa09390e6ab6b15f645f905828617577f041f2e24a9f1f2
-
SSDEEP
12288:HtQQXMENB9eh32XY7H/kiMpCJhnfZVCR4an2PAa:HuYGzkiMsJhnfG4a2PAa
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Sets service image path in registry
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-