General
-
Target
Order_0182PDF.exe
-
Size
457KB
-
Sample
211018-m19t2sedam
-
MD5
5e8eec1bdc70abb4e3be93a843eeec30
-
SHA1
54d7e644784ce87e47835f6d19db1da9d6425e40
-
SHA256
2728be4adab2d8fb44d7b076c1beace4142d2996d72b0f2af0f27d7aa9133505
-
SHA512
99140085f60884b6cfb3ee4c5c5b569f86e043de3be5960ea66621e130719b5697529e67032bcacc62fff088207aaf523c29093d120e0c32f7b66e7f28e13e1b
Static task
static1
Behavioral task
behavioral1
Sample
Order_0182PDF.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Order_0182PDF.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1968500169:AAHyFfTHMojfg0XGRFraaMexoQIFtILzuxU/sendDocument
Targets
-
-
Target
Order_0182PDF.exe
-
Size
457KB
-
MD5
5e8eec1bdc70abb4e3be93a843eeec30
-
SHA1
54d7e644784ce87e47835f6d19db1da9d6425e40
-
SHA256
2728be4adab2d8fb44d7b076c1beace4142d2996d72b0f2af0f27d7aa9133505
-
SHA512
99140085f60884b6cfb3ee4c5c5b569f86e043de3be5960ea66621e130719b5697529e67032bcacc62fff088207aaf523c29093d120e0c32f7b66e7f28e13e1b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-