General
-
Target
Dhl shipment documents 0002949400405000599500000.gz
-
Size
865KB
-
Sample
250123-klaejaslby
-
MD5
f4cbbaa69ad0ac9daa1adeda94c2271e
-
SHA1
2b27e9d6e6ee0738ef6b0a2b18ba5651d62a1ab7
-
SHA256
913d5397ce4a8fec1f11babd3f96bb8fad63ed1b92e6e06522b0e3882933649a
-
SHA512
4816de298a2cc84b333c31539117537c43e8626fd19b4a6d357645aa9a22d6683e8b2a1222b8d15f421e8ca2e5259146f8e58fc8107096a22159f1128142f2e4
-
SSDEEP
24576:NIxehn6MDH7ksloNlYexZF/q2BY+MjFNjdV:qeJxoNlYexa2BY7jFNjdV
Static task
static1
Behavioral task
behavioral1
Sample
Dhl shipment documents 0002949400405000599500000.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Targets
-
-
Target
Dhl shipment documents 0002949400405000599500000.exe
-
Size
896KB
-
MD5
22a542bc1325916eb1816ebca91fb95b
-
SHA1
88320ab57b6542208dc82b87ba7372c2b43f6aac
-
SHA256
36188bc6b8b6ff6066410e82279f79a7fe8ce638fa0e3b684ff008276689f867
-
SHA512
f7ec8166ef7202cf9f0917c2c5f7215a7ef942250ccba67a4a5ecf16ffbe5f6370ba871baabb4cfb2bcaa403bb83fe5fc41a813e1f5400c8551796068407eec3
-
SSDEEP
24576:cQ2HggprreJ47AsXQLY21226O31A3Rh+1d:aHgfm3XQL+I3q3Rh+1d
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-