General
-
Target
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
-
Size
466KB
-
Sample
210202-3gpqsqppmj
-
MD5
83ef3f626544cef2f0962863ab109634
-
SHA1
48d5a062ea59ea06afc5334a43f2537390660538
-
SHA256
5a18ef3e027b211901758fa2ffeaa63ae1ab87cdd85188660ab839771abb9ecb
-
SHA512
d9f127a33cb2a42b610e3f0e7ad057233e9491a37fc8342f92b216e6f1a3a470e26487bab74cb40209d5c084429db78152ed7266aaa1b56633aa0c6239c591e9
Static task
static1
Behavioral task
behavioral1
Sample
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
Resource
win10v20201028
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.zolvtek.com/ - Port:
21 - Username:
[email protected] - Password:
bird0006
Targets
-
-
Target
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
-
Size
466KB
-
MD5
83ef3f626544cef2f0962863ab109634
-
SHA1
48d5a062ea59ea06afc5334a43f2537390660538
-
SHA256
5a18ef3e027b211901758fa2ffeaa63ae1ab87cdd85188660ab839771abb9ecb
-
SHA512
d9f127a33cb2a42b610e3f0e7ad057233e9491a37fc8342f92b216e6f1a3a470e26487bab74cb40209d5c084429db78152ed7266aaa1b56633aa0c6239c591e9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
WSHRAT Payload
-
AgentTesla Payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-