General
-
Target
DHL shipments.exe
-
Size
1.0MB
-
Sample
211018-lfww1secaj
-
MD5
9aa7c9fe8f8e38438c612d37c8dca47a
-
SHA1
486451d8d4b9f4653cd2153a433362cfb58fa8d6
-
SHA256
32f57bd7d63cf9614a606939a9f1ab7c873e0773dca5259030aa480879a18513
-
SHA512
6c81d6d35896d1f83c2fd18718817bc180a4b9a25d2455f48af44d1d5ec781a77209242327a74bf46f0d6c618e84267dcbb43079a3b8b47eb051f7bef843a7e8
Static task
static1
Behavioral task
behavioral1
Sample
DHL shipments.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
DHL shipments.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.aivazibis.com - Port:
587 - Username:
[email protected] - Password:
kp@BFLC1
Targets
-
-
Target
DHL shipments.exe
-
Size
1.0MB
-
MD5
9aa7c9fe8f8e38438c612d37c8dca47a
-
SHA1
486451d8d4b9f4653cd2153a433362cfb58fa8d6
-
SHA256
32f57bd7d63cf9614a606939a9f1ab7c873e0773dca5259030aa480879a18513
-
SHA512
6c81d6d35896d1f83c2fd18718817bc180a4b9a25d2455f48af44d1d5ec781a77209242327a74bf46f0d6c618e84267dcbb43079a3b8b47eb051f7bef843a7e8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-