General
-
Target
d16e362431692632ebb42007262ccb4f81b1ae8d8c7f1608b8d5b5b36d9fa21c
-
Size
263KB
-
Sample
240521-bvdnwadg45
-
MD5
5ad95d14d6737df6422c30ce1e881676
-
SHA1
9e3c3c6a28ad01d2b177de823b4dbe727d6af964
-
SHA256
d16e362431692632ebb42007262ccb4f81b1ae8d8c7f1608b8d5b5b36d9fa21c
-
SHA512
4fc1d56af665cb390843c602a06295baa2b10c73ad9ab4a744efce90582ac384411dedc537edd1a6905ea20774d88361464e8da389d83566bc00b10f5e6bba68
-
SSDEEP
6144:UptJNtOjJ88W0vIjD6/pVXQmvPNyCs65QheHt/7tnyoQkC8:ypLn0vI3uf1yCs6KYHt/1yhu
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents POV2405023/Shipping Documents POV2405023.xlsx.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Shipping Documents POV2405023/Shipping Documents POV2405023.xlsx.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6760916656:AAFTROumNysgqsjoqAvyBqjbR9y3VV4we2Y/
Targets
-
-
Target
Shipping Documents POV2405023/Shipping Documents POV2405023.xlsx.exe
-
Size
371KB
-
MD5
2d3cfe702b5ed5064a086a7c63c9c853
-
SHA1
b74a924d93f66f0cf71023406a6959afe7a7c385
-
SHA256
e0ece16177937a72af5678f92fa79d6a9fd01213b33663b46c6106aa3189eb96
-
SHA512
cc45573b6c805763765b884d3ffa309bc4fd8f83508275a3323372d668afde693894aaa23840da52509054ca726a2ee1ec43fedab36fed9cb57437eaddf274e0
-
SSDEEP
6144:7IxY3q6emyxIeCc6LK+hRz9Fl7nNjknWlajhgVZfwJPH1Q+9fRQK1oErL:sxY66cMc6LL9v7uWrZfayYfRr1oK
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-