General
-
Target
DHL - 1300098083.exe
-
Size
916KB
-
Sample
240528-v93q4adf6x
-
MD5
de108d8d81b5b2a2d199780f60383811
-
SHA1
e34f230234d3c5ad53000a5b82924a5f4868a1a6
-
SHA256
93d7d0f76e38d907bfadf9d32f25b56db3f57c0a9de353a43ea26ae2b986d7a8
-
SHA512
b1239e3f423ab4a7869b31bd5a3b0c38c25d278453c8414c6318e243380bd5e7f2d0ea2bc6ed991e88e1828ada2f46f0b259a96a6ab09facbfeca7453dba627d
-
SSDEEP
12288:LIPJuCgzn0jF9AAkeXkKDh/mUM7wjLQKIV2LOaMwsr3cwomanLOCA:LIPJCTYnvh/mUdPQT8IwwMmca
Static task
static1
Behavioral task
behavioral1
Sample
DHL - 1300098083.exe
Resource
win7-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.strato.de - Port:
587 - Username:
[email protected] - Password:
6M9L22 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.strato.de - Port:
587 - Username:
[email protected] - Password:
6M9L22
Targets
-
-
Target
DHL - 1300098083.exe
-
Size
916KB
-
MD5
de108d8d81b5b2a2d199780f60383811
-
SHA1
e34f230234d3c5ad53000a5b82924a5f4868a1a6
-
SHA256
93d7d0f76e38d907bfadf9d32f25b56db3f57c0a9de353a43ea26ae2b986d7a8
-
SHA512
b1239e3f423ab4a7869b31bd5a3b0c38c25d278453c8414c6318e243380bd5e7f2d0ea2bc6ed991e88e1828ada2f46f0b259a96a6ab09facbfeca7453dba627d
-
SSDEEP
12288:LIPJuCgzn0jF9AAkeXkKDh/mUM7wjLQKIV2LOaMwsr3cwomanLOCA:LIPJCTYnvh/mUdPQT8IwwMmca
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-