General
-
Target
payment details.pdf.rar
-
Size
87KB
-
Sample
210227-pnqnyxgbyn
-
MD5
9db67123d16bf7c82c6001fd376f3aea
-
SHA1
f8b506939b8e0b2d46b140bbed63196b517e365f
-
SHA256
b1ca17a4e37f32c6785c2c08ddbbf96e4d287eecfbe32eb544c82e2a5dbd4312
-
SHA512
f90a3fcc2b7c76878a6a158dadaa0c17fbe92014685e9d057b2a8187c5789002e94380b348d5447feed350116b70d58fea6bdb90370bf654a2bd7f401842273a
Static task
static1
Behavioral task
behavioral1
Sample
payment details.pdf.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
payment details.pdf.exe
Resource
win10v20201028
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.etc-ks.com - Port:
587 - Username:
etc.express1@etc-ks.com - Password:
bEK2FBG#ds|K
Targets
-
-
Target
payment details.pdf.exe
-
Size
216KB
-
MD5
ce249eac42648acbd1fdb4dcac4b93b2
-
SHA1
ece85af062c4dba9a4b56b53b6f926fd974d7f90
-
SHA256
367bd3bbd27bcfb4020ea2e8e19bcef7e7613677514df74990980bb5cbd2faa4
-
SHA512
c16f1640fb08378054753c7d0ce520fbc8a7445d54bd9736c5594d0fa6127c7ca714974449e7b90e77db2afa6ce6392acd0507b80de75e8304e23c1c524b2d7e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops file in Drivers directory
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-