General
-
Target
DHL shipping documents.exe
-
Size
682KB
-
Sample
230330-janx4sbe25
-
MD5
58ee377b030f6d1a380b76eb27087448
-
SHA1
62bff8fa4ab84a7809645339a67455e2ebcd17b0
-
SHA256
2fbfd8a6b905dda74da9df102c7e161a9e4128e733a838aa644504dfb742ecf9
-
SHA512
4c339198fff413eff8555f450d91ac3df7c55ed045cf775d14ce5e7f4d2a27d975ee6848e4e09a71f9c2f117378daf869d768ab9a59f103a627d54fac2976536
-
SSDEEP
12288:NeJ/sI+up7hnevR9sf14ekA1/zio/vdcUdm+BE6fqBgTehA3jJBYyimOMt+Mm:8F5S9LtA1/zioXeOy6ohAdKyimX
Static task
static1
Behavioral task
behavioral1
Sample
DHL shipping documents.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
DHL shipping documents.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://discordapp.com/api/webhooks/1090526892546859069/Fs5P9aMlwDbngEv8TJoesSJJsR9-SwqnJQACOwlgNAl3_KMf2yCmWQL-j-8Q6X5F3HSv
Targets
-
-
Target
DHL shipping documents.exe
-
Size
682KB
-
MD5
58ee377b030f6d1a380b76eb27087448
-
SHA1
62bff8fa4ab84a7809645339a67455e2ebcd17b0
-
SHA256
2fbfd8a6b905dda74da9df102c7e161a9e4128e733a838aa644504dfb742ecf9
-
SHA512
4c339198fff413eff8555f450d91ac3df7c55ed045cf775d14ce5e7f4d2a27d975ee6848e4e09a71f9c2f117378daf869d768ab9a59f103a627d54fac2976536
-
SSDEEP
12288:NeJ/sI+up7hnevR9sf14ekA1/zio/vdcUdm+BE6fqBgTehA3jJBYyimOMt+Mm:8F5S9LtA1/zioXeOy6ohAdKyimX
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-