General
-
Target
DHL Original Document.exe
-
Size
579KB
-
Sample
230317-krlprafc36
-
MD5
7ce5957d016bc558a8aa30c3f28e30d4
-
SHA1
16be243943b88ddb768298f2370f583dcffc2211
-
SHA256
efa6869eaa796429cbd684b030cb6873262f6009997fe6f4c20ebd69b4ad54b6
-
SHA512
c8178c07a5222bbcd7076a33d91f36dc7fc310a140f775909e7ffe7caab185493409d375d2099a73737a4e091efa1a141af4bde2a7aceaba5d7122037d5533f4
-
SSDEEP
12288:9AbaXvQ2opbrGunDF6S9Dp9g2okqVvujHW7vU:mbuvQ2opPhnDF6YYiqVmj6vU
Static task
static1
Behavioral task
behavioral1
Sample
DHL Original Document.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
DHL Original Document.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6197320982:AAHJnu2nvbCAkbUWsL4Ucpaxjif4UB6T9NA/
Targets
-
-
Target
DHL Original Document.exe
-
Size
579KB
-
MD5
7ce5957d016bc558a8aa30c3f28e30d4
-
SHA1
16be243943b88ddb768298f2370f583dcffc2211
-
SHA256
efa6869eaa796429cbd684b030cb6873262f6009997fe6f4c20ebd69b4ad54b6
-
SHA512
c8178c07a5222bbcd7076a33d91f36dc7fc310a140f775909e7ffe7caab185493409d375d2099a73737a4e091efa1a141af4bde2a7aceaba5d7122037d5533f4
-
SSDEEP
12288:9AbaXvQ2opbrGunDF6S9Dp9g2okqVvujHW7vU:mbuvQ2opPhnDF6YYiqVmj6vU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v6
Defense Evasion
Bypass User Account Control
1Disabling Security Tools
3Modify Registry
6Scripting
1Virtualization/Sandbox Evasion
2