General
-
Target
ef9f1f860b713188f4622d6223f3fe90c804d4b4707eab79a7b22403b63f062b.zip
-
Size
661KB
-
Sample
240221-ewbsfsbh55
-
MD5
2afa37440793c40811a963eb6b45e270
-
SHA1
62a7177dcb32ef83e7ee9530cf83f5098932fc97
-
SHA256
ef9f1f860b713188f4622d6223f3fe90c804d4b4707eab79a7b22403b63f062b
-
SHA512
cfe5be24ba680ad0cb51aefd62d834406f188714efb0f7cdb310f75c5585ad67d0b0c87c4217fb706c121a62619821a85a2a4285b74673768be331405035cd94
-
SSDEEP
12288:YphEHz8cc+klL3lTGjbjnfZipa6wFFoNwu97PfJokNWRMCZ:Yp6O+kF3lTGjb7BipQF+dfJ3HA
Static task
static1
Behavioral task
behavioral1
Sample
SOA JAN 2024.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SOA JAN 2024.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.seawaysfreight-bd.com - Port:
587 - Username:
[email protected] - Password:
04@AjG%sFl# - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.seawaysfreight-bd.com - Port:
587 - Username:
[email protected] - Password:
04@AjG%sFl#
Targets
-
-
Target
SOA JAN 2024.exe
-
Size
690KB
-
MD5
79c8f05b3c7ff420dc57d120cc916064
-
SHA1
00d55766f5b7b93b3751b37a2acc1bb0c959e6b2
-
SHA256
8785f6e6f1278ba50e518c72e2e41a91b98f3e1b0e3b66723f6ee3166c4d4743
-
SHA512
9dec51f76bfea7b8d59430ddd9acc24b1aac4c1c11aa0049b40e6a6c2c0136fad3fbc4c3246c047e9241d9515728e32498372dc244036e6bcc02872be7b0ad28
-
SSDEEP
12288:pSmPwRYnOELz89/O+kXLntXnKbNtfZapa6OpJoLYu97l3JoQMmB:pSmP0Y74/O+k7nt3Kb/BapMJaz3JNMc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-