General
-
Target
shippingdocumentsPO4thcon.exe
-
Size
488KB
-
Sample
230704-re9pdafd5x
-
MD5
b5790577b0b5569b7deca9fbdb7c800a
-
SHA1
b60b70ac5c3a14ba1e3cfd919050db6756711bcf
-
SHA256
2be1be21688128f7fc05cdcfab69adc794d39910af884a9e63f920e415dc1657
-
SHA512
b7efd9dae680bb3137bf68a6aabd9f3486776d9bfbf8c9ef31192bf6183685e7a7839047adb8153eaa609ea7dc5b78776ee745c699ce5579bcf2f982bf7af144
-
SSDEEP
12288:HjvBe0cK1r1Jj1dSrCLh84IBKLOsiBPHW41M5:Hte0cyj7fh84M2OHfY
Static task
static1
Behavioral task
behavioral1
Sample
shippingdocumentsPO4thcon.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
shippingdocumentsPO4thcon.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6152671361:AAFL6hvnVRgXVOmTmyt-OBqBcWIytTVfN9M/
Targets
-
-
Target
shippingdocumentsPO4thcon.exe
-
Size
488KB
-
MD5
b5790577b0b5569b7deca9fbdb7c800a
-
SHA1
b60b70ac5c3a14ba1e3cfd919050db6756711bcf
-
SHA256
2be1be21688128f7fc05cdcfab69adc794d39910af884a9e63f920e415dc1657
-
SHA512
b7efd9dae680bb3137bf68a6aabd9f3486776d9bfbf8c9ef31192bf6183685e7a7839047adb8153eaa609ea7dc5b78776ee745c699ce5579bcf2f982bf7af144
-
SSDEEP
12288:HjvBe0cK1r1Jj1dSrCLh84IBKLOsiBPHW41M5:Hte0cyj7fh84M2OHfY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-