General
-
Target
SOA OEC Freight Korea.exe
-
Size
613KB
-
Sample
230719-gmwsdagh41
-
MD5
f878c9cbe2b0447a108032df274e7f74
-
SHA1
a25d519a8093591bd3a953b7bc0d39864723c893
-
SHA256
2d6e0405a2a3b73566f01d21c9747d6a09e65a0b093f980d915d3cb3f1ff89b3
-
SHA512
cf8d4e3968dab7d18401f098f88fabbaee338b52ab118f305d585a6b0892716632770d5f2bc94226baf5706266e23c6c593c08bada12491439cc0b5eb5363b09
-
SSDEEP
12288:zmAY2kcdbL4Ef70MESJNvl4UDrCnxFKp4GCp2NFkHh/pf/qKko4MmVNso:yN6GEf70MEqhiyyxtmKmoFmVNso
Static task
static1
Behavioral task
behavioral1
Sample
SOA OEC Freight Korea.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SOA OEC Freight Korea.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.icmpp.ro - Port:
587 - Username:
[email protected] - Password:
puCHImic2019 - Email To:
[email protected]
Targets
-
-
Target
SOA OEC Freight Korea.exe
-
Size
613KB
-
MD5
f878c9cbe2b0447a108032df274e7f74
-
SHA1
a25d519a8093591bd3a953b7bc0d39864723c893
-
SHA256
2d6e0405a2a3b73566f01d21c9747d6a09e65a0b093f980d915d3cb3f1ff89b3
-
SHA512
cf8d4e3968dab7d18401f098f88fabbaee338b52ab118f305d585a6b0892716632770d5f2bc94226baf5706266e23c6c593c08bada12491439cc0b5eb5363b09
-
SSDEEP
12288:zmAY2kcdbL4Ef70MESJNvl4UDrCnxFKp4GCp2NFkHh/pf/qKko4MmVNso:yN6GEf70MEqhiyyxtmKmoFmVNso
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-