General
-
Target
b36be049cc3924ab4e57a27c2fef33149dbb5ed5df907f0ca665c685fe5ad15e
-
Size
848KB
-
Sample
240925-e3nqlavfnj
-
MD5
08b938525e6a8d3f9d5ac6d8c91e588c
-
SHA1
0780678587c6702474edccfd87be445ec943a6a3
-
SHA256
b36be049cc3924ab4e57a27c2fef33149dbb5ed5df907f0ca665c685fe5ad15e
-
SHA512
424ae685d604d0ab209f68599eb09c9e136e071ae47eb56de0a98f75e4b564e280b1ac9c94e971d9c09fc4f3746811b05265e3eaad88ef4d8e2604314065e103
-
SSDEEP
24576:DzaqtRE5KkvYxlCg2vj8wpLQIUgJHIU1j:PDWKkwxlCgcj3LQlJUp
Static task
static1
Behavioral task
behavioral1
Sample
COMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
COMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.laboratoriosvilla.com.mx - Port:
587 - Username:
[email protected] - Password:
WZ,2pliw#L)D - Email To:
[email protected]
Targets
-
-
Target
COMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exe
-
Size
1.1MB
-
MD5
7b29104168610875dc525f1939c1be9d
-
SHA1
a35013b158fae14b83e1596098a032f70114d0df
-
SHA256
f04633dabb4fbf66d38cc86181f7770d44910073d4866acd15ae29f96edf4863
-
SHA512
bd13dc4b52f4c612ce8b07971952156bae9631f47d82cc3e619ca37bbdfbe89489fab78855437926b3c233c92b11cf9bc7f39a4d81ea030d801aec6f637d063c
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCPl+2KvjAwpNksq2JH28O4:7JZoQrbTFZY1iaCPl+2Qj7Nk9h89
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-