General
-
Target
7ccbf5f74be56cd5921069366e3e6e7e8fdd06c7e0630de19e505d70e82edc7f
-
Size
663KB
-
Sample
240228-bgskwaff6w
-
MD5
28249a4c777daf16ea664d3dde2bfe6a
-
SHA1
8dad752b503cf9efa75cc6bbedfb9cca98716709
-
SHA256
7ccbf5f74be56cd5921069366e3e6e7e8fdd06c7e0630de19e505d70e82edc7f
-
SHA512
dc4d4e83a4fe99a31cf01bce8c2008125696b63a3e124e5495578dab094bd82b01fd4ba5dc96a2473b74f1f1a037f113a204e8f05901cd4bb21a63a3f0b02630
-
SSDEEP
12288:jxo0HZt48qCf7XnFFqd0v5JAnyNr/YFhTtrlpEeGZqgmFUiHBR:ja0Hv48rrFsdSAnyNr/OBpwaR
Static task
static1
Behavioral task
behavioral1
Sample
DHL9407155789.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
DHL9407155789.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.childs-plays.com - Port:
587 - Username:
[email protected] - Password:
yuttrge7v - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.childs-plays.com - Port:
587 - Username:
[email protected] - Password:
yuttrge7v
Targets
-
-
Target
DHL9407155789.exe
-
Size
790KB
-
MD5
0cc7ea8604079f77c76b13049c47f22a
-
SHA1
c30e82a0f13f57ae766633a1fe7221e60db4d19e
-
SHA256
9344791020d84c327e17e94aaabcec10a2c37199484b05429493236fda65df01
-
SHA512
f47057fc67e12faace21b5aa5bbf6df960ef97bb1459232ad014cb4f587376c88dbf1961d81941af9b48df6c0b5a097ad48e500c5fce5e4e798264cd02d7feca
-
SSDEEP
12288:ma1ScVYsq0fJPnFPq9qvZJMpyNTBOFHq9abIPBrlpEyKP4biOR/:TSOYs/5Fi9OMpyNTBPw+BpkCiA/
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-