General
-
Target
DHL airwaybill # 6913321715.pdf.exe
-
Size
613KB
-
Sample
211025-gyrykagfaq
-
MD5
88ad25beeb143d46152cc1968fedfdca
-
SHA1
227071cc6681ca773729fe034bd76ba23f0bd7b9
-
SHA256
368d524b4b5c6920e2d290364c9d42bfe3c01fd7583b5d8ef51787f9c8fa81f1
-
SHA512
a0e35bc1bd051263b6f02d1d6756b934db48a46f2c43c4225e957822d88e640459bc42329c192ef1c85333f703825144fa9f9bba15e4cf3986d9bca7458a751b
Static task
static1
Behavioral task
behavioral1
Sample
DHL airwaybill # 6913321715.pdf.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
DHL airwaybill # 6913321715.pdf.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.jatc0fs.com - Port:
587 - Username:
[email protected] - Password:
PNyjQwb9
Targets
-
-
Target
DHL airwaybill # 6913321715.pdf.exe
-
Size
613KB
-
MD5
88ad25beeb143d46152cc1968fedfdca
-
SHA1
227071cc6681ca773729fe034bd76ba23f0bd7b9
-
SHA256
368d524b4b5c6920e2d290364c9d42bfe3c01fd7583b5d8ef51787f9c8fa81f1
-
SHA512
a0e35bc1bd051263b6f02d1d6756b934db48a46f2c43c4225e957822d88e640459bc42329c192ef1c85333f703825144fa9f9bba15e4cf3986d9bca7458a751b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-