General
-
Target
Enquir002,pdf.7z
-
Size
414KB
-
Sample
211203-tf47dshaal
-
MD5
f506bdae818f6ffeacb5e47635ffa1b1
-
SHA1
6824d3ec2b4d0a36e2318509d291109a7ecf824b
-
SHA256
4806ddaf7cbad4917ca57a3f37c0fe990607bd8e2c111f070476346374b315e7
-
SHA512
a735a689d49dd4037962e42880e61ba9d3597c075603e7dd0c270f34f2b97f7f3d94dbd8148248d29b94c97f16082531e02a787c8dbcb1aa61187fc38a69cca1
Static task
static1
Behavioral task
behavioral1
Sample
Enquir002,pdf.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
Enquir002,pdf.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.devmetsan.com.tr - Port:
587 - Username:
[email protected] - Password:
Murat2019*
Targets
-
-
Target
Enquir002,pdf.exe
-
Size
463KB
-
MD5
69f985ebd82e4988d25630542527eeae
-
SHA1
9d2781e21779f1a7b2f0a8bbb4354b6a7471c394
-
SHA256
5a752626283f4d935d97c24abec8d829f7c3f69a97a5a423ab5ce3cd4e2446fb
-
SHA512
5b4bab6a78fc88e2aebfc5c49a3a9944c2286ef0afc3f7a7ae16032f8ba433269cfc197eed5a20801551b0fd1b97d6af4dba08a2e9d2f253d6bbaf0a519273a2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-