General
-
Target
DHL DLIVERY PERCEL.exe
-
Size
797KB
-
Sample
211025-gyrykaffe9
-
MD5
5e8244fb1be90200656767e9c1a93144
-
SHA1
211743f1587cb8322d3f5c0b45a868a11b1ba566
-
SHA256
a2f932924ad1fed3019fc434a560d1bbf9e9e85215decbdfa3a19397fd7d2de6
-
SHA512
541847a86c2365b8dd044431a27a351b151330677fb08a30dc1b42a0f856681d47a59788fd2d7a6cf5202117769ef14d3cf14639c5e6e585adef2fade2f995e8
Static task
static1
Behavioral task
behavioral1
Sample
DHL DLIVERY PERCEL.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
DHL DLIVERY PERCEL.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
washingtondc300
Targets
-
-
Target
DHL DLIVERY PERCEL.exe
-
Size
797KB
-
MD5
5e8244fb1be90200656767e9c1a93144
-
SHA1
211743f1587cb8322d3f5c0b45a868a11b1ba566
-
SHA256
a2f932924ad1fed3019fc434a560d1bbf9e9e85215decbdfa3a19397fd7d2de6
-
SHA512
541847a86c2365b8dd044431a27a351b151330677fb08a30dc1b42a0f856681d47a59788fd2d7a6cf5202117769ef14d3cf14639c5e6e585adef2fade2f995e8
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Suspicious use of SetThreadContext
-