General
-
Target
invoice and packing List.exe
-
Size
742KB
-
Sample
230316-he57hsbg4v
-
MD5
9a763390b850487e2a8c849fa66a2a12
-
SHA1
bf754c07dcbabf51f7715a036f30d8eeb7d73710
-
SHA256
b9e9daf6bb717f1fcf48903988ff22e8d08a2d7df065f08d4f7051afced9d66c
-
SHA512
ea15111be91d3c47545051202a470f4b6cdf7cf44af99e102f7ee3f09065cd32db3fb5a0f9b1ed37b514737fd4ee7e16f8d4154225f133f7f5679a9fff56d07f
-
SSDEEP
12288:CC1j6Y9gO5ap6Pqpa8TJSFf6UJEW0yKmKlcY0iyIRf9DjRq+2W5OCcuzQvJGRTw:CCd6YSOSsGJSFiGxKmKqYByE9fR72kfY
Static task
static1
Behavioral task
behavioral1
Sample
invoice and packing List.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
invoice and packing List.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.southernboilers.org - Port:
587 - Username:
[email protected] - Password:
Sksmoke2018# - Email To:
[email protected]
Targets
-
-
Target
invoice and packing List.exe
-
Size
742KB
-
MD5
9a763390b850487e2a8c849fa66a2a12
-
SHA1
bf754c07dcbabf51f7715a036f30d8eeb7d73710
-
SHA256
b9e9daf6bb717f1fcf48903988ff22e8d08a2d7df065f08d4f7051afced9d66c
-
SHA512
ea15111be91d3c47545051202a470f4b6cdf7cf44af99e102f7ee3f09065cd32db3fb5a0f9b1ed37b514737fd4ee7e16f8d4154225f133f7f5679a9fff56d07f
-
SSDEEP
12288:CC1j6Y9gO5ap6Pqpa8TJSFf6UJEW0yKmKlcY0iyIRf9DjRq+2W5OCcuzQvJGRTw:CCd6YSOSsGJSFiGxKmKqYByE9fR72kfY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-