General
-
Target
DHLShippingdocuments0020398484995500.exe
-
Size
513KB
-
Sample
241002-hb92assalj
-
MD5
1506261e1a6e12c9eadfcbe91a859f76
-
SHA1
061aa09172c0daef3fc975919a02413ab3a6f01e
-
SHA256
0dc8ced22931e20ec965bc36c06a974016fe223434d9553007b4a6c04973b2cb
-
SHA512
d8491578697b3308925637c9981d1544095741586e9369cec9330f8948c8dd7a09ffe9bf450f25e4c4a21e91eff00283d10e615acb866748dece290897ee88b5
-
SSDEEP
12288:d4S3sE6hTGrF3CKf04A1+0MX2dsFvs1HGqR:yh6rF3CKf1A1zKxJsZP
Static task
static1
Behavioral task
behavioral1
Sample
DHLShippingdocuments0020398484995500.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Extracted
Protocol: ftp- Host:
ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Targets
-
-
Target
DHLShippingdocuments0020398484995500.exe
-
Size
513KB
-
MD5
1506261e1a6e12c9eadfcbe91a859f76
-
SHA1
061aa09172c0daef3fc975919a02413ab3a6f01e
-
SHA256
0dc8ced22931e20ec965bc36c06a974016fe223434d9553007b4a6c04973b2cb
-
SHA512
d8491578697b3308925637c9981d1544095741586e9369cec9330f8948c8dd7a09ffe9bf450f25e4c4a21e91eff00283d10e615acb866748dece290897ee88b5
-
SSDEEP
12288:d4S3sE6hTGrF3CKf04A1+0MX2dsFvs1HGqR:yh6rF3CKf1A1zKxJsZP
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1