General
-
Target
DHL AWB - COMMERCIAL INVOICE, BILL OF LADING, ETC DOC.exe
-
Size
886KB
-
Sample
230112-q8rvzsgb82
-
MD5
de4e94b9cdaec8b858cb6784cbb0e5f4
-
SHA1
1076ebc249a2e3031ecaa17879fbf740e4ff66f2
-
SHA256
f77fe8a7ebe7c42c57282c9cd76924949352b8ea05b9f4225508f815c6ae2aa6
-
SHA512
93b7771c6308bdfb20331674abbde7d79669834d916cb85cc4738bdd4f85451a419e0be89ce0cc5c050f980f8f86b6f9534b79922e4842b326e31985d8ce64eb
-
SSDEEP
24576:P+X+RblGyXxTEb8E03mh3xiJZtSKIKTn6AL:PbA58FWh6
Static task
static1
Behavioral task
behavioral1
Sample
DHL AWB - COMMERCIAL INVOICE, BILL OF LADING, ETC DOC.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DHL AWB - COMMERCIAL INVOICE, BILL OF LADING, ETC DOC.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.nutiribio.com - Port:
587 - Username:
[email protected] - Password:
zGNVO(l5
Targets
-
-
Target
DHL AWB - COMMERCIAL INVOICE, BILL OF LADING, ETC DOC.exe
-
Size
886KB
-
MD5
de4e94b9cdaec8b858cb6784cbb0e5f4
-
SHA1
1076ebc249a2e3031ecaa17879fbf740e4ff66f2
-
SHA256
f77fe8a7ebe7c42c57282c9cd76924949352b8ea05b9f4225508f815c6ae2aa6
-
SHA512
93b7771c6308bdfb20331674abbde7d79669834d916cb85cc4738bdd4f85451a419e0be89ce0cc5c050f980f8f86b6f9534b79922e4842b326e31985d8ce64eb
-
SSDEEP
24576:P+X+RblGyXxTEb8E03mh3xiJZtSKIKTn6AL:PbA58FWh6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-