General
-
Target
c7abec7766ae833d5ee6011ee05179aae5930424ae870d0995b48f12c956852a
-
Size
616KB
-
Sample
240529-b8hjzsdf2v
-
MD5
868c9a9d3f3a2aac454ed1b78129acba
-
SHA1
43ebb354ad9e1ba6f4b5541857d8c221aabf259c
-
SHA256
c7abec7766ae833d5ee6011ee05179aae5930424ae870d0995b48f12c956852a
-
SHA512
2e925b0f316ae97bff1c9dd31380ba4539771cc9465fa16f4f6cb1db39f42019e492a1e68cf86195b02f1219f12a015b422e3f01c166705c7ae5207cfb567666
-
SSDEEP
12288:sGocBkJ8uBBlhrOWu+ih3pk2aJLhEvV4lnjpgds0H5LFJa:3op8urlNOWuhh3S2ajMMnjpgdsgxJa
Static task
static1
Behavioral task
behavioral1
Sample
shipping information.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
shipping information.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.asplparts.com - Port:
587 - Username:
[email protected] - Password:
CPMWkhyu7=b8 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.asplparts.com - Port:
587 - Username:
[email protected] - Password:
CPMWkhyu7=b8
Targets
-
-
Target
shipping information.exe
-
Size
632KB
-
MD5
4ec4c75000926de4b30a57b971b1fd9a
-
SHA1
53b88b8f13d354e1fbdb1fb96cc600e1f5db6077
-
SHA256
0e4eab3e8d91e2c3097b28f55b5e0d6531e671bb5933c186cc5de11e72e67f74
-
SHA512
2343a5e1cbe8b762008904dbdb0b5afeeda33c0b8b318b4156bca7332e04150cbdc27bb1ada169993217bc330bdb8db9977f7d84fc1906fb5fa38c08c73428e1
-
SSDEEP
12288:AhYSgu/UtgCpJ8hsrqgu+iJ3pG2upLdinV4lFFNOdEgHzh8h:7S9UtBpJ8hYqguhJ3A2uzcMFFNOdEO8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1