General
-
Target
SHIP PARTICULARS.exe
-
Size
453KB
-
Sample
230519-ql8j8agg9x
-
MD5
c04215e833e361c1ae1a08f2aba85e07
-
SHA1
c90112d6c22d213018d54bfb68e25d864ae7e546
-
SHA256
765c609266421fe30c769a001ca281aef3341c889230ae4c328f05cf69c89d6e
-
SHA512
93c78513ddc27c09988ec823224956daad63933d461a2575c925d3a680aed671bd35cf3fec3fd42f8e7374a6ce48aac771550e4edd949fc07344fde17252eee1
-
SSDEEP
6144:zAJGMcnDC6+r7eCtNnhkTUQ1O37EagSBG+wKb5sOqk1vwuRcYn4:Umr6tg3147LbrwKbFqk1YuRc
Static task
static1
Behavioral task
behavioral1
Sample
SHIP PARTICULARS.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SHIP PARTICULARS.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1897716112:AAEAtOCkOV8umHBB93Og24bkiIdUKReGK44/
Targets
-
-
Target
SHIP PARTICULARS.exe
-
Size
453KB
-
MD5
c04215e833e361c1ae1a08f2aba85e07
-
SHA1
c90112d6c22d213018d54bfb68e25d864ae7e546
-
SHA256
765c609266421fe30c769a001ca281aef3341c889230ae4c328f05cf69c89d6e
-
SHA512
93c78513ddc27c09988ec823224956daad63933d461a2575c925d3a680aed671bd35cf3fec3fd42f8e7374a6ce48aac771550e4edd949fc07344fde17252eee1
-
SSDEEP
6144:zAJGMcnDC6+r7eCtNnhkTUQ1O37EagSBG+wKb5sOqk1vwuRcYn4:Umr6tg3147LbrwKbFqk1YuRc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-