General
-
Target
BL-SHIPPING DOCUMENTS.exe
-
Size
478KB
-
Sample
221129-xm2xdsfg39
-
MD5
69fe54a9cafee09f25e0d3f7a51488c7
-
SHA1
747373a2640c7fca04258681c7ec313be3b0db24
-
SHA256
dc72c7525da8aa1afaadaf707499054dd9be20d0c78318d2f63af1fa37d58546
-
SHA512
4230111e1b90da8e5d628bcfd16f9381cb24e9c0e31d3772798ea5bf78c711bc2634bf0343f323d094f23f587b6be5fd41f7828323d09f8a3ce0506c65a50706
-
SSDEEP
12288:0ZYJmqS//u3ML7l++F7oNt6YkIwaD2YSHTK:0Sg43ML7cEs8VaYTK
Static task
static1
Behavioral task
behavioral1
Sample
BL-SHIPPING DOCUMENTS.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
BL-SHIPPING DOCUMENTS.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5515611206:AAEcQSX8hXHOAxSYr8KUdLxGF5eqw4FRXoA/
Targets
-
-
Target
BL-SHIPPING DOCUMENTS.exe
-
Size
478KB
-
MD5
69fe54a9cafee09f25e0d3f7a51488c7
-
SHA1
747373a2640c7fca04258681c7ec313be3b0db24
-
SHA256
dc72c7525da8aa1afaadaf707499054dd9be20d0c78318d2f63af1fa37d58546
-
SHA512
4230111e1b90da8e5d628bcfd16f9381cb24e9c0e31d3772798ea5bf78c711bc2634bf0343f323d094f23f587b6be5fd41f7828323d09f8a3ce0506c65a50706
-
SSDEEP
12288:0ZYJmqS//u3ML7l++F7oNt6YkIwaD2YSHTK:0Sg43ML7cEs8VaYTK
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Sets service image path in registry
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-