General
-
Target
3c538ae59b80d697d9303c8a9a4a13fc5d5320857875f904795d01562e5f3a2a.zip
-
Size
598KB
-
Sample
240327-cndkzaac22
-
MD5
89880f36b9129a8e39c543c1dbc80526
-
SHA1
892b8c2809a64c7cccf99caa7ddb522a0d7feabc
-
SHA256
3c538ae59b80d697d9303c8a9a4a13fc5d5320857875f904795d01562e5f3a2a
-
SHA512
75665a803a0a125f300114e82f2f15c954a5b1964c675f0f0933eedafe7299825442bf347c90d8516e16c40663147d0175090c5e050b7b90a8afec8b5a53fd0f
-
SSDEEP
12288:zzI+JfNkkyRaGxscEUMstFF0H45Aiyu9t2crxXAv0uIAKaf:zc+NNRuxNNYiv1FXAMj2
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING DOCUMENTS.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SHIPPING DOCUMENTS.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.starlinetrading.com - Port:
587 - Username:
[email protected] - Password:
Tmn@#1571963?% - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.starlinetrading.com - Port:
587 - Username:
[email protected] - Password:
Tmn@#1571963?%
Targets
-
-
Target
SHIPPING DOCUMENTS.exe
-
Size
615KB
-
MD5
86dfaa3196ac1180b5bd54c6addf7ca5
-
SHA1
f302cf1dd35df3ca9fa8b813118c4aa313b37087
-
SHA256
ac517064216de46a3c1ab91e2623170b89eef04b4e64b1c24149c1bb64b24ec8
-
SHA512
a20413165f74faa85f7f0b6eb57c60279cf2850925821608a63e7aec5b27de5a8f1aebe3268415ff8c2054a0f82f38938cefbae421137e6082ecb3898330662b
-
SSDEEP
12288:8Qla5Wssg0ReoxacuUM2tFVGHmrWiSu9tMA390ozn3OqZ1iSN4dw4tjZw6sMA4Ta:7/UCxb16iPNtRbOqZwSN4dw4tjZw6sM6
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables packed with SmartAssembly
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Suspicious use of SetThreadContext
-