General
-
Target
DHL_AWB 46773482.exe
-
Size
921KB
-
Sample
221208-m327zscg2x
-
MD5
5d00deb790e91a9fc7825b1cb40f83d5
-
SHA1
dd0cf26e60669d92585b91cd2d202d7f076c0d1b
-
SHA256
6d9fe00277d47e78b6f9e954ddf8a63c581a1aacdae27bc8ad99a17db8919f8f
-
SHA512
2cf8bb0b8a4b368d5e44ffb7ffa2172d45869670b255699347a040c39d51b9d52a18b4f7102a3287b30bc6747d9223a2e1d0c8133dff0095e677303c251270d2
-
SSDEEP
24576:LN/zl9IhZmBHT4fgQNYyaFZUR4cGRV0wN1j:lz3IhSHYggYyOZe4cGb
Static task
static1
Behavioral task
behavioral1
Sample
DHL_AWB 46773482.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DHL_AWB 46773482.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cnseguros.hn - Port:
587 - Username:
[email protected] - Password:
Rebecca2007
Targets
-
-
Target
DHL_AWB 46773482.exe
-
Size
921KB
-
MD5
5d00deb790e91a9fc7825b1cb40f83d5
-
SHA1
dd0cf26e60669d92585b91cd2d202d7f076c0d1b
-
SHA256
6d9fe00277d47e78b6f9e954ddf8a63c581a1aacdae27bc8ad99a17db8919f8f
-
SHA512
2cf8bb0b8a4b368d5e44ffb7ffa2172d45869670b255699347a040c39d51b9d52a18b4f7102a3287b30bc6747d9223a2e1d0c8133dff0095e677303c251270d2
-
SSDEEP
24576:LN/zl9IhZmBHT4fgQNYyaFZUR4cGRV0wN1j:lz3IhSHYggYyOZe4cGb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-