General
-
Target
f568ce7db6d1771bef9736db48fabf56893363bd7fe8de4addb30243a1906e7a
-
Size
371KB
-
Sample
220521-pdt67aacfp
-
MD5
aa91e991c3db37976a8f49a2410a7ea3
-
SHA1
bde90a77f6ad29e4e9d7f92c38716ec8ebe4b5e1
-
SHA256
f568ce7db6d1771bef9736db48fabf56893363bd7fe8de4addb30243a1906e7a
-
SHA512
4288af89735cb8a6ca7c3c6d1423b5ebfc4305056155379429ac18e8d09048efa1663785181a9b78b8c8065e9d15b3cbe01086f4671dee7c8d9ed50dbb46baed
Static task
static1
Behavioral task
behavioral1
Sample
Quotation856784.Scan.pdf...exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Quotation856784.Scan.pdf...exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.brighttextiles.com - Port:
587 - Username:
ashfaq@brighttextiles.com - Password:
rabiammi
Targets
-
-
Target
Quotation856784.Scan.pdf...exe
-
Size
518KB
-
MD5
1215485cb68eaf43a0c6ab2bc053760d
-
SHA1
2461af3628b32b1704d3ac64fe1fb2ccef0a4a26
-
SHA256
cb9867492e8957b7b53233a7d2b63bc713a429a756b56166440fb4ef7fa22acc
-
SHA512
908329b7b47bc714f8d99532c919ee1a0fef61c9ac33ab18abb19886b88e33152dbb6d95e915fb86f5b22558a8bf9d05d7950348f7c461f11b194bb16d0aa428
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-