General
-
Target
d18e2f4903806f4e84849179a1ff724877ea9953ef600ec51cfbd1fe6ed63f2a
-
Size
719KB
-
Sample
220521-nqr2xshbdl
-
MD5
83488509a76c3e43533ab26e0277e724
-
SHA1
4f7274bb8ae6ccfb046c378fa6aabab98dd40d14
-
SHA256
d18e2f4903806f4e84849179a1ff724877ea9953ef600ec51cfbd1fe6ed63f2a
-
SHA512
6942833967b838e55b3fa932bfe93fd71ef7edad0b0fa5b31dfc5fb385e9312a6fd36f70332843754c4b4bbfdb6345f1e7517b04ab813299e29ed04440816f1f
Static task
static1
Behavioral task
behavioral1
Sample
Quotation_2817.PDF....exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Quotation_2817.PDF....exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bosut.mk - Port:
587 - Username:
[email protected] - Password:
0XsKEemhd6EE
Targets
-
-
Target
Quotation_2817.PDF....exe
-
Size
833KB
-
MD5
92f3335d62d0fd3237481ee357c5c4b0
-
SHA1
2b1dcc3d5076af52f78befbf332d56349d1a6b0f
-
SHA256
c9a1de280156ec597ed843bb47c13fcc149914f9e7740604a1d834a9d033beb7
-
SHA512
5d7ea8d48f3c99205ce781ddf3d59175ac10f47421c34885f6384b521622820a7a130223f661e860197b2f7f73008a2c670835776f2f09c888465cba58d5e33e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-