General
-
Target
f2745b58e1afef569a2d1825e984c1010fb364b13fc0b6c1cc23d13ababb9925
-
Size
621KB
-
Sample
240619-cxq8eswgkn
-
MD5
0d8b99c9024079f7dfe44081fe30b900
-
SHA1
71a516bdcf6fee5b0eebbc1ebf0bdc9ff10fadf4
-
SHA256
f2745b58e1afef569a2d1825e984c1010fb364b13fc0b6c1cc23d13ababb9925
-
SHA512
8798b82ef1f1ea46c3174c4fd611f34ac8cf1087c9fd2a17fab9551ba721eb22968ae7562a035e7448d32d9695be0869928554ab29158e778fa883eb8842f990
-
SSDEEP
12288:6yG9zJ2rXvqIsXUiflmNl1fFQEX+mpTGuurRkFnqRQ53dQ25QA:PYJW/qNUidmNvFQKTGuu1Zk225QA
Static task
static1
Behavioral task
behavioral1
Sample
TNT AWB AND COMMERCAIL INVOICE TRACKING DETAILS.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
TNT AWB AND COMMERCAIL INVOICE TRACKING DETAILS.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.laboratoriosvilla.com.mx - Port:
587 - Username:
[email protected] - Password:
WZ,2pliw#L)D - Email To:
[email protected]
Targets
-
-
Target
TNT AWB AND COMMERCAIL INVOICE TRACKING DETAILS.exe
-
Size
1.0MB
-
MD5
a494e3769a2f84e1338583c536444d2b
-
SHA1
50e68f707dce4a35bd6a140efbe33c26c780f0ae
-
SHA256
377df318502b404bf7b0a8cb059aa3eba749e06b366e13c393ebfd588b4a6b7b
-
SHA512
76b148e3df7d06eaa716f5c38240aee3060fcaf9abbcb4e2b959539a1494d986218bd89a71ab2eaa223a11509edbeb2c6091d825f05b1b8e28b3b70d2d56f2be
-
SSDEEP
24576:WAHnh+eWsN3skA4RV1Hom2KXMmHaQLGWvk2Ys5:xh+ZkldoPK8YaQLGWvRv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-