General
-
Target
SHIPPING DOC 590083154XXDEC023.exe
-
Size
336KB
-
Sample
231207-rg9gdsbg32
-
MD5
c209447f93b5e53fdd35790c731a302e
-
SHA1
cfda675b975d2a6843c42c2ac34bc6dc446b1c9e
-
SHA256
80a2010e0a0ade699a0c4bc3d5f739491d4ea6ccf4abe39b8232ef39dc7aa430
-
SHA512
70a77048dc6b48c2b78647f547a53c3fe6c85c1689e0604ad106edbc3159dddfb2a252087d7c936d04cdd454f135b590aa1c56d06cefc7354cdc2cc946239a6d
-
SSDEEP
6144:MIN6ZNMDr8b6jtf9H3kqQrOjA3JWcgmNqQ8twGSzNXUKFWtWRCYgXbQg9uaR:MIgbM/8ujF9H3khcgWcgmNqQ84XUGWcO
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING DOC 590083154XXDEC023.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
SHIPPING DOC 590083154XXDEC023.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.asiaparadisehotel.com - Port:
587 - Username:
[email protected] - Password:
^b2ycDldex$@ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.asiaparadisehotel.com - Port:
587 - Username:
[email protected] - Password:
^b2ycDldex$@
Targets
-
-
Target
SHIPPING DOC 590083154XXDEC023.exe
-
Size
336KB
-
MD5
c209447f93b5e53fdd35790c731a302e
-
SHA1
cfda675b975d2a6843c42c2ac34bc6dc446b1c9e
-
SHA256
80a2010e0a0ade699a0c4bc3d5f739491d4ea6ccf4abe39b8232ef39dc7aa430
-
SHA512
70a77048dc6b48c2b78647f547a53c3fe6c85c1689e0604ad106edbc3159dddfb2a252087d7c936d04cdd454f135b590aa1c56d06cefc7354cdc2cc946239a6d
-
SSDEEP
6144:MIN6ZNMDr8b6jtf9H3kqQrOjA3JWcgmNqQ8twGSzNXUKFWtWRCYgXbQg9uaR:MIgbM/8ujF9H3khcgWcgmNqQ84XUGWcO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-