General
-
Target
SHIPPING DOC.exe
-
Size
468KB
-
Sample
231003-t64csaff34
-
MD5
ceb7360515aa7e471ab8d71d8db60ee4
-
SHA1
ebd58701a518b1144b3013b13a56249abc64a7db
-
SHA256
747bda3ff9c92152209f373690f37337288a013504d676611041fe577877f898
-
SHA512
41a65f2912f6880f3129e9185feedbfbe5d230b76722f610e6d12baf21027f571323a44f0b4278368c197638f2a0c2329e7662db23bfc333797d5fe48d9c1e0d
-
SSDEEP
6144:boVSWGOhF5wIohI84eGaSQy9C54yyi3uV9WvRXf7tgX/uPNLrDb2m/yzCSll9kHn:cUOhF5YvxSQy9j6uVU9OUrDF/yuH
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING DOC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SHIPPING DOC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
MAIL.gcsho.com - Port:
587 - Username:
[email protected] - Password:
global321# - Email To:
[email protected]
Targets
-
-
Target
SHIPPING DOC.exe
-
Size
468KB
-
MD5
ceb7360515aa7e471ab8d71d8db60ee4
-
SHA1
ebd58701a518b1144b3013b13a56249abc64a7db
-
SHA256
747bda3ff9c92152209f373690f37337288a013504d676611041fe577877f898
-
SHA512
41a65f2912f6880f3129e9185feedbfbe5d230b76722f610e6d12baf21027f571323a44f0b4278368c197638f2a0c2329e7662db23bfc333797d5fe48d9c1e0d
-
SSDEEP
6144:boVSWGOhF5wIohI84eGaSQy9C54yyi3uV9WvRXf7tgX/uPNLrDb2m/yzCSll9kHn:cUOhF5YvxSQy9j6uVU9OUrDF/yuH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-