General
-
Target
DHL airbill # 6923325623.exe
-
Size
413KB
-
Sample
231012-e2q5bseg2y
-
MD5
435022390602be3ee5676935cc8057d3
-
SHA1
c1fbf945c24282bccbe95624579c50f1a91782ef
-
SHA256
9d92ea17930270e7461e09315f5a9ac5f89fe57e1203dc10344e2480f4707b1b
-
SHA512
fc5e9d1ae5a75b18adc019ae6ca9942214b3ce979abcb96e4436ecd00e985f2f9bc9b0dcbdae4bdcf2dda197b04fd104983d68878692ac2b1f10c4d938621483
-
SSDEEP
12288:MYyy2tlqQ2vdJMzsvmDtGt9ZNZjTXGbjLaHcB:MYyy2tlqvvbEsuDUtzNVDGXIcB
Static task
static1
Behavioral task
behavioral1
Sample
DHL airbill # 6923325623.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
DHL airbill # 6923325623.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
DHL airbill # 6923325623.exe
-
Size
413KB
-
MD5
435022390602be3ee5676935cc8057d3
-
SHA1
c1fbf945c24282bccbe95624579c50f1a91782ef
-
SHA256
9d92ea17930270e7461e09315f5a9ac5f89fe57e1203dc10344e2480f4707b1b
-
SHA512
fc5e9d1ae5a75b18adc019ae6ca9942214b3ce979abcb96e4436ecd00e985f2f9bc9b0dcbdae4bdcf2dda197b04fd104983d68878692ac2b1f10c4d938621483
-
SSDEEP
12288:MYyy2tlqQ2vdJMzsvmDtGt9ZNZjTXGbjLaHcB:MYyy2tlqvvbEsuDUtzNVDGXIcB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-