General
-
Target
605847ee5914069e73c3e5c6ccf966856d05b0cd0f578ec3c77434c65e91cb91
-
Size
678KB
-
Sample
231012-m1d3daed7z
-
MD5
0e3129b6466b160788ecc007e43586a0
-
SHA1
b310ee3755a00fc4420a7ec75d1791db325adcdc
-
SHA256
605847ee5914069e73c3e5c6ccf966856d05b0cd0f578ec3c77434c65e91cb91
-
SHA512
486efc1314a97569ae447c2fc1359e4751c5a9554b959705115b0d741c81998371ca1afdcfecb087e6aa64ca9ac26f97f0e41f8ca0465d46ca349691f1b04ce9
-
SSDEEP
12288:cFliuhdIJ+2LfOpc4jhy6KfkVs5nwI52+enYhK2z0iMrr5HEmcjUa:QU2J2LWLxKZnF52+eYh2iu9EVga
Static task
static1
Behavioral task
behavioral1
Sample
Arrival notice & invoice.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Arrival notice & invoice.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
sh003.webhostbox.net - Port:
587 - Username:
[email protected] - Password:
G6KW=wadZopf - Email To:
[email protected]
Targets
-
-
Target
Arrival notice & invoice.exe
-
Size
879KB
-
MD5
e5faa0a406f795ec682f0e4bd40e864e
-
SHA1
71ce7a4bf08ea3f93bd2f0ec87858ddf905bb9c6
-
SHA256
14eda8169470cdd9ad6067447888eb2f2b68968f15e6d8113d01de3cdadf5faa
-
SHA512
6342e5c6c2019e7b588eb8ece1ff118fb12161c52d133d172fde46e61c360efc44d55b33a00c106755d978641d02269b966960ba52e4c448027b6f9b3a2d7762
-
SSDEEP
12288:a2eoZWZOpPXCbQg3/nLLhqiV06YmpERcarsuh2LZDmz8hWnpRJ5PH2RT3rgM:ZdxaL/LLbVPJwAM2LZDnJRDrg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-