General
-
Target
Proforma Invoice.pdf.z
-
Size
444KB
-
Sample
211019-hsmx4agccn
-
MD5
25c416091c47cc01fd7b404b21e097a1
-
SHA1
28b55b3be4a7773fd0064a501e05b9dffed62278
-
SHA256
02775b6ac6554e57854050cd6462a2bb1086a45607b6a5f22b6fb111e6880391
-
SHA512
618b376ac762b7d80634b1f5bc3c01fb55f2157fe53293f29614f27a3f064b328d1063f766142e2748b4ae354e5d12221434841959d6215df2f666b8e3cc1853
Static task
static1
Behavioral task
behavioral1
Sample
Proforma Invoice.pdf.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Proforma Invoice.pdf.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.daproviaggi.it - Port:
587 - Username:
[email protected] - Password:
vacanz.E43
Targets
-
-
Target
Proforma Invoice.pdf.exe
-
Size
551KB
-
MD5
4aed86a83d6470edf10d71508c18e3c9
-
SHA1
871973f1e5c71dc0d7e2b6bcd080be3d58b713f1
-
SHA256
d83c9b45e97010c3c45988042a6f4e6c6c0945425853fed6f821aa0d28652f68
-
SHA512
5d55f756f6483c075f2bec2650a8aec221fbe29f45f2425241e4a338c03eca6c01297b08d17da0abb1e2cbb038ac398f893ad25daa7c3e5432afd047830a9713
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-