General
-
Target
DHL Express Shipment Documents.exe
-
Size
791KB
-
Sample
230217-h2f6xadg9v
-
MD5
32637f18fd6b2728d0d023fece62ed0e
-
SHA1
f1a935df27f8307450ece11578a6e798c394276e
-
SHA256
85d955830522460b5b0a001b35c7bf6b99962b6a4e8431990f24c077a9474bd3
-
SHA512
bcb88bbf6f86452db5457c552c7e6fe7599d366e0ba7486889caa3d1fe34dd2e547808abcd7088c3e44b71bdcce70463d2930c826ae5e325717a8bcf8c31a775
-
SSDEEP
12288:uhu4qDSu4Dsv9tXGJriI5+iK6MYWCYnOE7RUv4TvebtMDsv9tYVBjyE0Cb9hNZdt:uhu4qDSub8rG6MYWOE7MOeGZ
Static task
static1
Behavioral task
behavioral1
Sample
DHL Express Shipment Documents.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DHL Express Shipment Documents.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1075778535278518443/QQb7Cd08b69uL50e3krm5eUuWTxoJlmNvAzD2e00mUF_DkIk551NHimF6vf-8Owfolb0
Targets
-
-
Target
DHL Express Shipment Documents.exe
-
Size
791KB
-
MD5
32637f18fd6b2728d0d023fece62ed0e
-
SHA1
f1a935df27f8307450ece11578a6e798c394276e
-
SHA256
85d955830522460b5b0a001b35c7bf6b99962b6a4e8431990f24c077a9474bd3
-
SHA512
bcb88bbf6f86452db5457c552c7e6fe7599d366e0ba7486889caa3d1fe34dd2e547808abcd7088c3e44b71bdcce70463d2930c826ae5e325717a8bcf8c31a775
-
SSDEEP
12288:uhu4qDSu4Dsv9tXGJriI5+iK6MYWCYnOE7RUv4TvebtMDsv9tYVBjyE0Cb9hNZdt:uhu4qDSub8rG6MYWOE7MOeGZ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-