General
-
Target
Dhlshipment 3456098723456.exe
-
Size
865KB
-
Sample
221206-hs93magg5v
-
MD5
fcb56e47f1380baf357ea73fa0202560
-
SHA1
9936e97353ade62b3f17d044e798439761902efd
-
SHA256
9bbde4505ae5917c4068f53e4d85edc007bc93756be890dd112eae08a7e20e7c
-
SHA512
c3bdbb0ecef0497b4bd82b401620247e16ba2832a3f2edbfc5a557d246726678feb7ff3c015224fdf412b66385789ca87872be9b95f7977d5474110f046a0308
-
SSDEEP
12288:pcONn8UvvH8amPsfTpmiS24CuiKZ2YMUx0oB1fIwjmaJgKZ/nXt7virmWhlGLaQ1:ajAhmIlmiSC9nUxLB1J
Static task
static1
Behavioral task
behavioral1
Sample
Dhlshipment 3456098723456.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Dhlshipment 3456098723456.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5970985875:AAGxcS7riy4ZlEmFj2Z031AsUoRvment2iI/
Targets
-
-
Target
Dhlshipment 3456098723456.exe
-
Size
865KB
-
MD5
fcb56e47f1380baf357ea73fa0202560
-
SHA1
9936e97353ade62b3f17d044e798439761902efd
-
SHA256
9bbde4505ae5917c4068f53e4d85edc007bc93756be890dd112eae08a7e20e7c
-
SHA512
c3bdbb0ecef0497b4bd82b401620247e16ba2832a3f2edbfc5a557d246726678feb7ff3c015224fdf412b66385789ca87872be9b95f7977d5474110f046a0308
-
SSDEEP
12288:pcONn8UvvH8amPsfTpmiS24CuiKZ2YMUx0oB1fIwjmaJgKZ/nXt7virmWhlGLaQ1:ajAhmIlmiSC9nUxLB1J
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-