General
-
Target
0770133d27e47a0cbbac1ce9e1147182a607711907158b2f97b6dda8cea997d7
-
Size
543KB
-
Sample
220520-2pf5xsfga2
-
MD5
07eb6b28637c601a058c32f7dc9a8f7a
-
SHA1
c2f2dff111acc1ce356a8cf71132beb50bdab16a
-
SHA256
0770133d27e47a0cbbac1ce9e1147182a607711907158b2f97b6dda8cea997d7
-
SHA512
c71afd8746a432b9f5796c009229f4ced1c1eea8770a801730032abf8a56481be78bb7cf2f4938795c4b32a23b070bcd740c7fd132dcc958f1a56c546337bcff
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Invoice.pdf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
SAIRAM@98765
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
SAIRAM@98765
Targets
-
-
Target
Invoice.pdf.exe
-
Size
576KB
-
MD5
930091c98bb3b061c28b243dff029dee
-
SHA1
931dd659e1b25157cb04eddd79fe7581511842b5
-
SHA256
b250144e3bf196501c5064576d34ff66398323d7862e957f359a263d7a0c3636
-
SHA512
32cdd782f4ec5c0a9e1034fe6a46e1b5e0edcbf5118d36fddd0db71958cda5e52676a00e9c4b538a86eaf6aada8dd9732cad13d74150c98e12ffa3e5aa5d7232
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-