General
-
Target
1ea26893b98115c9c36c6c1ecb7b4fa28b71ea8dc91f7219c7e54d9f95d4bf8e
-
Size
809KB
-
Sample
220521-dxdg1agdh8
-
MD5
cc5d1ba1b2cd9a126ce8cbc974e01f68
-
SHA1
f0819d43a4c6fab61ac49829a704db3e9193775f
-
SHA256
1ea26893b98115c9c36c6c1ecb7b4fa28b71ea8dc91f7219c7e54d9f95d4bf8e
-
SHA512
2b3220b2229f5cf20eb75c07c51cb3fb4bbaadebf7cb12507fc2c4fa0599833dc504146a0045565a8b7cb60793764f78d573a668c10faed350f1edc43b09bc58
Static task
static1
Behavioral task
behavioral1
Sample
DHL_AWB #1008936572891_pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
DHL_AWB #1008936572891_pdf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\3B8E3C2477\Log.txt
masslogger
Targets
-
-
Target
DHL_AWB #1008936572891_pdf.exe
-
Size
2.1MB
-
MD5
3e910208a9f1bf03108895af8671078c
-
SHA1
6b59a64f11e6559c1354c8097856593469ecd8bc
-
SHA256
885179565290381c8e8e883f1e4c776507c1ddd3bfa8902f432ea31fbf01c683
-
SHA512
525ee64a0e0915fa5f35534187c230d3526395ebb42d7c0c68123b9804158d66d0078821c0e7f7a1bf7554322fa28a47d73a6422a7e451fd7dac3062b43dffeb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
AgentTesla Payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-