General
-
Target
Purchase Inquiry_pdf.exe
-
Size
501KB
-
Sample
211018-r9be3aegbn
-
MD5
efed7c80f2d5d857f01cb11fce2969ec
-
SHA1
ac23b49c35518ed2f6730e26b45e1684568be1cd
-
SHA256
f69d3da755e1879ba7c75e9eeb0d855b23f5cb3a3a58785d25eb23acdcfc421f
-
SHA512
bcac675ca3876d324ff0a92a7627043cddceaf5c767ae57bac23ba631190d6a98a0b77556665a67e570f3b24b25fb9f1bed87c308dedad13abb83561dddb6891
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Inquiry_pdf.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Purchase Inquiry_pdf.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot2046248941:AAG5Z0PyWwtApmPaysBm59voK10ec9Rgnaw/sendDocument
Targets
-
-
Target
Purchase Inquiry_pdf.exe
-
Size
501KB
-
MD5
efed7c80f2d5d857f01cb11fce2969ec
-
SHA1
ac23b49c35518ed2f6730e26b45e1684568be1cd
-
SHA256
f69d3da755e1879ba7c75e9eeb0d855b23f5cb3a3a58785d25eb23acdcfc421f
-
SHA512
bcac675ca3876d324ff0a92a7627043cddceaf5c767ae57bac23ba631190d6a98a0b77556665a67e570f3b24b25fb9f1bed87c308dedad13abb83561dddb6891
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-