General
-
Target
dhl-1465666436....pdf.exe
-
Size
827KB
-
Sample
230322-xpsrhacf6w
-
MD5
c1c91e8643a6d65d7a228ae95262737b
-
SHA1
5373d071c4efbc92bb844bf2a50983fa46620092
-
SHA256
572cff30e2206bea4616dfe3ff3dcf490728492fd22f5b52a2caf54d8dfef82b
-
SHA512
3fe77b5046c878c66b331a1e646a12c3a06c6972a67da278a7c3e89356d904acc010af93462b310f923e01bbf3270a6d8d44a679e0757ebb16ebe3e79c78e006
-
SSDEEP
12288:O0CS9eM71FJkICyqrY9RrgdIq5MIp5jW5zG36epb+1l/:oQ1zkdK6LppW5s6m
Static task
static1
Behavioral task
behavioral1
Sample
dhl-1465666436....pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dhl-1465666436....pdf.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://carbonwatt.com - Port:
21 - Username:
[email protected] - Password:
k)G8;,rq1MNz
Targets
-
-
Target
dhl-1465666436....pdf.exe
-
Size
827KB
-
MD5
c1c91e8643a6d65d7a228ae95262737b
-
SHA1
5373d071c4efbc92bb844bf2a50983fa46620092
-
SHA256
572cff30e2206bea4616dfe3ff3dcf490728492fd22f5b52a2caf54d8dfef82b
-
SHA512
3fe77b5046c878c66b331a1e646a12c3a06c6972a67da278a7c3e89356d904acc010af93462b310f923e01bbf3270a6d8d44a679e0757ebb16ebe3e79c78e006
-
SSDEEP
12288:O0CS9eM71FJkICyqrY9RrgdIq5MIp5jW5zG36epb+1l/:oQ1zkdK6LppW5s6m
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-