General
-
Target
nWaybill_Receipt DHL4704321510pdf.img
-
Size
188KB
-
Sample
230707-qyw2ysaf2t
-
MD5
d97877e6e4838faffc8cc86541fa36a2
-
SHA1
b5ce082953d027cbb970582d2be28e3dcb066b5a
-
SHA256
e724d07cfaef54796894b9738d5a67d876bc31b12608e251b419b1c1f24afa53
-
SHA512
c5d07afd5fdb51875c9ad8cef89d7f43c89225ba8167917e10cd15ae6c1214257e2b7b5d96e805e18bccb25ddf6447c315572fdc871c262241d2616e91bbbe36
-
SSDEEP
3072:H64/4iUSMBl+jh3rvkA2GSFVfxpuu6xr4o3qd:H64/4pSMB83rIXxpHo3
Static task
static1
Behavioral task
behavioral1
Sample
Waybill_Receipt DHL4704321510pdf.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Waybill_Receipt DHL4704321510pdf.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot2100759405:AAHQxGXNxGeuNgcAgCwnT3oqpIfFhYBuhgo/
Targets
-
-
Target
Waybill_Receipt DHL4704321510pdf.exe
-
Size
137KB
-
MD5
6b512fd94524086c363a2d12863b741e
-
SHA1
383d836a88c06f0d8cc0f6f8249c7fafece7e2c9
-
SHA256
98f78a6c3ba93ab5350b3d148455261b214e9f29836f56305a0f8f72a7690d4a
-
SHA512
c724945eaa686ae365648dd129f572fdba582d5a94583d83935d58d572b6731c6d4c438b625b96237ee9ae731b9f6bea114c0e8548c141e2cc6bc32f08be185b
-
SSDEEP
3072:M64/4iUSMBl+jh3rvkA2GSFVfxpuu6xr4o3qd:M64/4pSMB83rIXxpHo3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-