General
-
Target
Invoice approved.pdf.exe
-
Size
676KB
-
Sample
200708-8ccdte87rx
-
MD5
dec84f6b8adf05075f43025708c0ccaa
-
SHA1
d8ed043b7b4057670dfbd7d7c8039fcb0f5de792
-
SHA256
18a41b50c8885afe4978787aa8c44601134838f73f66e7edc520bad7d76bfad2
-
SHA512
aaa3becc54d34d5ee1f884a527a1f73afbd774b72fc7d46106a87c4c08397447c3e2bae16275e5bc0b841ee332efd169fd12a9e4d021dbef086c69225e431cb9
Static task
static1
Behavioral task
behavioral1
Sample
Invoice approved.pdf.exe
Resource
win7
Behavioral task
behavioral2
Sample
Invoice approved.pdf.exe
Resource
win10
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
kingmoney12345
Targets
-
-
Target
Invoice approved.pdf.exe
-
Size
676KB
-
MD5
dec84f6b8adf05075f43025708c0ccaa
-
SHA1
d8ed043b7b4057670dfbd7d7c8039fcb0f5de792
-
SHA256
18a41b50c8885afe4978787aa8c44601134838f73f66e7edc520bad7d76bfad2
-
SHA512
aaa3becc54d34d5ee1f884a527a1f73afbd774b72fc7d46106a87c4c08397447c3e2bae16275e5bc0b841ee332efd169fd12a9e4d021dbef086c69225e431cb9
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
UPX packed file
Detects executables packed with UPX/modified UPX open source packer.
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-