General
-
Target
DB_DHL_AWB_001833022AD.7z
-
Size
618KB
-
Sample
230606-qy359sed8w
-
MD5
fd20abca016a7adf06a96e1e102feb30
-
SHA1
34892393f556fbc6bf81cf9f8e86487770bf9351
-
SHA256
3ae42ecf7bb90d10e2f9104e4e9a7c9866a5042d3543836b18f7ce6cf32356ea
-
SHA512
58db3bf3011d7b6167775ee9b4b4010f22fde903480168cfde22933c39524cb37850343f8a5085c374efd631a93bc63effd6a32608ec4e5a8c1122903f102b43
-
SSDEEP
12288:DhlG88MXFjsK4SB4fWfhNszzl0nMWXa9qyxSaJwzFrwpzFU:9ld8MXFwDSBDhNsl0MVIpEppU
Static task
static1
Behavioral task
behavioral1
Sample
DB_DHL_AWB_001833022AD.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
DB_DHL_AWB_001833022AD.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.fest-thailand.info - Port:
587 - Username:
[email protected] - Password:
payment1759 - Email To:
[email protected]
Targets
-
-
Target
DB_DHL_AWB_001833022AD.exe
-
Size
724KB
-
MD5
9dc4c0b44a4365eb0ff2cb9cde1b9672
-
SHA1
2974174559138c35dd0229107e78b888460306db
-
SHA256
73ce1d5ddffdbd047c15e2bbdace225e6defc74eff88958911641f5fde726081
-
SHA512
4fd297e8c66bcbdd56238ecdf0ac10e8cefff70517caa01376c8abf52be0fddd673a15c9e5b47c6611d22dbd6989cff846f3c85cee6cf8ba76e52b32571e935c
-
SSDEEP
12288:lhRP2B0xTGlxNqvNu2hZ+nUEsn9cIg4Jk4GWfhNczzLsBKCXa8gyxSkJwQ+0j5Lg:l3PLaVUH999VhJk+hNcLsgYaQ+0tLg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-