General
-
Target
Shipping_Document-001222890.exe
-
Size
782KB
-
Sample
231009-jm4jbsbd31
-
MD5
f2fe88b581743e12a33d2218ea90c470
-
SHA1
8538b393ee59d2e0fc286e23d8a1d999f3249f14
-
SHA256
1f22495e0f459d46c901746a490c146552173cb83d629bdb694f5961c09be657
-
SHA512
4596943cd12032dbcd8b962050fe43abff7c78030c471b6df56644ffa95bfd27ea0a1a42adedfc188c3933f0d33ba190f26de98ecc8347a2633c5b1857a21a35
-
SSDEEP
12288:Ktx1TuJM7w/QwacdVS6j4xgZYv/cNoPLx+hkQPFtF:iJZw3Nj4hcePLxukQPF
Static task
static1
Behavioral task
behavioral1
Sample
Shipping_Document-001222890.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Shipping_Document-001222890.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.frontierfulfillment.com.my - Port:
587 - Username:
[email protected] - Password:
5_8B6kjVm - Email To:
[email protected]
Targets
-
-
Target
Shipping_Document-001222890.exe
-
Size
782KB
-
MD5
f2fe88b581743e12a33d2218ea90c470
-
SHA1
8538b393ee59d2e0fc286e23d8a1d999f3249f14
-
SHA256
1f22495e0f459d46c901746a490c146552173cb83d629bdb694f5961c09be657
-
SHA512
4596943cd12032dbcd8b962050fe43abff7c78030c471b6df56644ffa95bfd27ea0a1a42adedfc188c3933f0d33ba190f26de98ecc8347a2633c5b1857a21a35
-
SSDEEP
12288:Ktx1TuJM7w/QwacdVS6j4xgZYv/cNoPLx+hkQPFtF:iJZw3Nj4hcePLxukQPF
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-