General
-
Target
Proforma Invoice.pdf.exe
-
Size
432KB
-
Sample
211020-rfmw1aaael
-
MD5
6adcb6c525f1ea72aa50d28fd1a1b56e
-
SHA1
7b33eefe789ead32f955784d6ced94ca94e492dd
-
SHA256
f7888d776884d5a8ae1a862a91749ae83bdc227ecb6943a01bb57b27e4565967
-
SHA512
8d8b31e0c94e5aec71a5188b547fe7254ecb9a75ffe31abe9dd990e1fe0fb241ca8bd8ef4a554343e9e888dd43f15c0bb03c5cd14e3c45720a982c1aa90e2c7d
Static task
static1
Behavioral task
behavioral1
Sample
Proforma Invoice.pdf.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Proforma Invoice.pdf.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.daproviaggi.it - Port:
587 - Username:
[email protected] - Password:
vacanz.E43
Targets
-
-
Target
Proforma Invoice.pdf.exe
-
Size
432KB
-
MD5
6adcb6c525f1ea72aa50d28fd1a1b56e
-
SHA1
7b33eefe789ead32f955784d6ced94ca94e492dd
-
SHA256
f7888d776884d5a8ae1a862a91749ae83bdc227ecb6943a01bb57b27e4565967
-
SHA512
8d8b31e0c94e5aec71a5188b547fe7254ecb9a75ffe31abe9dd990e1fe0fb241ca8bd8ef4a554343e9e888dd43f15c0bb03c5cd14e3c45720a982c1aa90e2c7d
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-