General
-
Target
Shipping Documents_pdf.exe
-
Size
727KB
-
Sample
230330-lr7snaca66
-
MD5
e399967f344f4ddec61d6f1e60a313d3
-
SHA1
aa5f796682d7f2366f941dfbba5801f61af26c80
-
SHA256
d6c546c30a81e6e73411e37ea4379e329ae218b9614b4bd3ca878148d0749dd2
-
SHA512
f7557b613f5e76a6e574b7786c39ec86988016a43ded36e9fd3cf42bc0b8b61e39631734b10711dda94db33b447b10dfaf1fa7590da43526d00835bfd2e78e76
-
SSDEEP
12288:5HrmYMUnFW/NGbab94ZAda92D67NUoSeFgFDF/72reKSXXT4GfS6ffRilcy3EZ3s:5HrUozZWa92DAUo4Bxaqzx/ffRilhEZz
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents_pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Shipping Documents_pdf.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.huiijingco.com - Port:
587 - Username:
[email protected] - Password:
lNLUrZT2 - Email To:
[email protected]
Targets
-
-
Target
Shipping Documents_pdf.exe
-
Size
727KB
-
MD5
e399967f344f4ddec61d6f1e60a313d3
-
SHA1
aa5f796682d7f2366f941dfbba5801f61af26c80
-
SHA256
d6c546c30a81e6e73411e37ea4379e329ae218b9614b4bd3ca878148d0749dd2
-
SHA512
f7557b613f5e76a6e574b7786c39ec86988016a43ded36e9fd3cf42bc0b8b61e39631734b10711dda94db33b447b10dfaf1fa7590da43526d00835bfd2e78e76
-
SSDEEP
12288:5HrmYMUnFW/NGbab94ZAda92D67NUoSeFgFDF/72reKSXXT4GfS6ffRilcy3EZ3s:5HrUozZWa92DAUo4Bxaqzx/ffRilhEZz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-