General
-
Target
5dfa193d083fcbe25cc3f69f6f5f961a0cefb60f9fcac2a79b27b7c04b2ab5fd
-
Size
52KB
-
Sample
250128-jmdmxaskex
-
MD5
495d28d427b7dd6ded022a630cbc1834
-
SHA1
b31faca2738f78fc7b656e2a9f4a2b12ba011e37
-
SHA256
5dfa193d083fcbe25cc3f69f6f5f961a0cefb60f9fcac2a79b27b7c04b2ab5fd
-
SHA512
a6abcc2e64d372d0dcc6c97cb5caa367b64eb0af0a8f7083538899e8fe2e5c05fbc6954836ab27c63b2484a224f1740aa050edddd0f26106f2a8be4fec1b81e4
-
SSDEEP
1536:v9tZRsu2zdyfpuvvKODUu4EpVQdLJsMcVUf5u1q:ZRl2zcAvR4kQdLJJceBYq
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Docs_waybill NO 2005xxx351.wsf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Shipping Docs_waybill NO 2005xxx351.wsf
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://res.cloudinary.com/daxwua63y/image/upload/v1737543662/new_image_h8btwc.jpg%20
https://res.cloudinary.com/daxwua63y/image/upload/v1737543662/new_image_h8btwc.jpg%20
Extracted
agenttesla
https://api.telegram.org/bot6050556352:AAE_-mublQ2CllMbT9xkQVBjSBbdvdYR1kM/
Targets
-
-
Target
Shipping Docs_waybill NO 2005xxx351.wsf
-
Size
189KB
-
MD5
3b970c76dbc74cd9b119f487a22c1683
-
SHA1
4ebb9876723c2fc5fda46b098094cf0104efac55
-
SHA256
73b63a59ea3c5c6f049420fb7a4a4dc4e91036c24e2b25bae406aac1f56a1812
-
SHA512
74f4bbe6c8ff3769e4a70189bf28aba7ac0bf8c6a4440c88b24fa6d2207ea4169f032b37d465ca981f2bc4f69f25fd089256bde24d88f7a4e003f6d80beef821
-
SSDEEP
3072:z/zQ6Vv//riU/tEqZjCwNZiU/tEyWiU/tEqZjCwNZiU/tEAI6:0U/tESLNQU/tEylU/tESLNQU/tEa
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1