General
-
Target
963382A0017CF0A755FEEE18DBA48A9EB5F33A34CCE840BCF0DE13FFC5003057
-
Size
338KB
-
Sample
221208-yfghjseb5x
-
MD5
c8a55456dd5024439763ebc9fa618cf0
-
SHA1
145242e1b1d50212a4b3fa7d60c45ff28eb40a66
-
SHA256
963382a0017cf0a755feee18dba48a9eb5f33a34cce840bcf0de13ffc5003057
-
SHA512
3ccff323659bc7cf75285b42c047f0ea47eb9165c305278c4213da328fc4e7f22e40e40ec0294fe80f54ea3e94c1b643bc112d52ebdc0439737da5ff91fb9aaa
-
SSDEEP
6144:TP22YbD7S+3DKxy4ffU5/SE6xipagZhsUXnBA93GPT1bDyIaOc5IS7du:T0D7S+X4fs5tmiPNBoWPTlejO2X7w
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Docs PO12399/Shipping Docs PO12399.xlsx.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Shipping Docs PO12399/Shipping Docs PO12399.xlsx.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5870878058:AAEtYpDY1LBnBQGwZvkWktoa3wzKq0kSk78/
Targets
-
-
Target
Shipping Docs PO12399/Shipping Docs PO12399.xlsx.exe
-
Size
440KB
-
MD5
a11bfa3fee20595f6562c0b2eb07fe83
-
SHA1
61dceafd6971eba650ebab7b8aa3f8ab42ade135
-
SHA256
6f3f44cde64cfb8b414ce1b26816a0e78bc14e90e2b5fee63991d9359122d481
-
SHA512
c69113d36c9c95f3550fd6ffade2df958aa332a910b827a559257ed7e6b52e62fa7852073c21108bda37cb7c063edae9debe4e9514394b7f6d8c7b7b5029ed6a
-
SSDEEP
12288:BXmWAakvgHhyXkv0xIYjbZcn4M79pkbzmKaukoki/:BXGYkUMx7VM4M79LiP/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-