General
-
Target
DHL-#AWB130501923096.exe
-
Size
353KB
-
Sample
200713-6dvh7assta
-
MD5
91c50c43932cbbf106bb36bc614d053c
-
SHA1
24e75ba96eaa2a54b1bb55e29ce7ea990e7c7131
-
SHA256
66e0e592828da25235eccd1a7fdb3138f6acb5ee9d89bb483d8a384ef264a394
-
SHA512
291e33bc0a4a4e35b834650d129435b8c021f7b1eeda91d45b70764f2a7a12853c632f9f70a0b9780fd2ef4e6c40e2ece42524ef5575f6c3111e1b9eab5ad563
Static task
static1
Behavioral task
behavioral1
Sample
DHL-#AWB130501923096.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
DHL-#AWB130501923096.exe
Resource
win10
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
faith12AB
Targets
-
-
Target
DHL-#AWB130501923096.exe
-
Size
353KB
-
MD5
91c50c43932cbbf106bb36bc614d053c
-
SHA1
24e75ba96eaa2a54b1bb55e29ce7ea990e7c7131
-
SHA256
66e0e592828da25235eccd1a7fdb3138f6acb5ee9d89bb483d8a384ef264a394
-
SHA512
291e33bc0a4a4e35b834650d129435b8c021f7b1eeda91d45b70764f2a7a12853c632f9f70a0b9780fd2ef4e6c40e2ece42524ef5575f6c3111e1b9eab5ad563
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Suspicious use of SetThreadContext
-