General
-
Target
Maersk BL 208268807.exe
-
Size
1.1MB
-
Sample
230614-fnjzjada95
-
MD5
389b1ceb54ef9b29abd411ecc34a81e3
-
SHA1
10d1d0b6079b473cbc2f80fae531c5249d869b10
-
SHA256
57191284c75940f3a637266acc38d3a503ab97a52c9d99a0a85ff61d27420b6f
-
SHA512
fbdd56931a513a22eb7bea4f520b7cdcfc15b9b7b2035783be27dc4d200c4de0ea92b4529372dbb89153f3869dcb07366a9485c932e1d75ef542461bad61df19
-
SSDEEP
24576:x9g5RKfkbB7XrwQVAv4OagvtRejXSWfJ:Q5R5BXEQ+4OagKfJ
Static task
static1
Behavioral task
behavioral1
Sample
Maersk BL 208268807.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Maersk BL 208268807.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1633482536:AAF1JIS_DaayovuRrLGy_POYaI3DRc2CrPY/sendDocument
Targets
-
-
Target
Maersk BL 208268807.exe
-
Size
1.1MB
-
MD5
389b1ceb54ef9b29abd411ecc34a81e3
-
SHA1
10d1d0b6079b473cbc2f80fae531c5249d869b10
-
SHA256
57191284c75940f3a637266acc38d3a503ab97a52c9d99a0a85ff61d27420b6f
-
SHA512
fbdd56931a513a22eb7bea4f520b7cdcfc15b9b7b2035783be27dc4d200c4de0ea92b4529372dbb89153f3869dcb07366a9485c932e1d75ef542461bad61df19
-
SSDEEP
24576:x9g5RKfkbB7XrwQVAv4OagvtRejXSWfJ:Q5R5BXEQ+4OagKfJ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-