General
-
Target
SHIPPING DOC.zip
-
Size
304KB
-
Sample
230208-pcqsdaab3x
-
MD5
7e27729f780e9da172d75ff02d84120a
-
SHA1
fdc10d9b61cc24061e59cc6ff84be8ba88926566
-
SHA256
829fedfd6f7e2d6dc3476e2ddb808b305fa4a3fe47798eafbd56419afb727ec1
-
SHA512
a140a627022767e310f21a0716c12025e328cb8d8ee9030d8ee19a28b481db1c17fbc3e676a7d295700e4075a1accf24ad911c17bd1a5acf40bb5794b3b62276
-
SSDEEP
6144:g/jUb7Z48G42uQzEAZfBQnfx4S6nLvnlGVsUe6W67wXa2rAZazCSM6:grUbVk427zEcQfSSUvnlGVNZWiwXa2Dd
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING DOC.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SHIPPING DOC.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.strictfacilityservices.com - Port:
587 - Username:
[email protected] - Password:
SFS!@#321 - Email To:
[email protected]
Targets
-
-
Target
SHIPPING DOC.exe
-
Size
318KB
-
MD5
f0df3f64cd9ebf1a531f4e8b5dec03be
-
SHA1
f7ccc908d93b1ac35772d6b0828483bf8a228b96
-
SHA256
3652bafc6040261b1ee34d360ca1f2a28277a258e9ed843ff0b8c846df58f8ca
-
SHA512
34c8de594cc92c3ff8180e3b68ab4fae1eab89a9a808f1307a3104a83e0011de59280039cef677de802746dabb3df196cdc058493388b3017386bc6349d869b9
-
SSDEEP
6144:vYa6fi4AuazCAnfpQ/bx4S6RLvnNGVsGe6Q67wX+2j2ZazCJMG:vY1i4A3zCaQDSSMvnNGVHZQiwX+2BTG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-