General
-
Target
0372YT591445-22 -33,000-EUR-SWIFT MESAJI.pdf.exe
-
Size
1.0MB
-
Sample
221027-nwskmscaa8
-
MD5
7d1ce33dd0b35916568574bc74bdd9ec
-
SHA1
ae301f0385186c4b471c5fdb81ba867fabcb4005
-
SHA256
dea123120680cd1e4b53ed10ad4b6be99792c0d2847652edc4f7bb5e0eaa3c7b
-
SHA512
039da908c27be7c199134b69a60d081e3b94e85d6b6130e9605efb87978c63c81ccd9982f0d235aefe571f44faff7dc0e42a2359d06841e7252b072c89f368a1
-
SSDEEP
12288:k0uI/f2CWjxdgKhkR/3z3q018CcGc44OmTv/mytaS10/9YR4bJ8dFY4Hs:1Xu/dgnR/iCQO6F8adu4M
Static task
static1
Behavioral task
behavioral1
Sample
0372YT591445-22 -33,000-EUR-SWIFT MESAJI.pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0372YT591445-22 -33,000-EUR-SWIFT MESAJI.pdf.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5409839916:AAEYUYZy0IhJQAm4VXi620si4okGW8FDL2w/
Targets
-
-
Target
0372YT591445-22 -33,000-EUR-SWIFT MESAJI.pdf.exe
-
Size
1.0MB
-
MD5
7d1ce33dd0b35916568574bc74bdd9ec
-
SHA1
ae301f0385186c4b471c5fdb81ba867fabcb4005
-
SHA256
dea123120680cd1e4b53ed10ad4b6be99792c0d2847652edc4f7bb5e0eaa3c7b
-
SHA512
039da908c27be7c199134b69a60d081e3b94e85d6b6130e9605efb87978c63c81ccd9982f0d235aefe571f44faff7dc0e42a2359d06841e7252b072c89f368a1
-
SSDEEP
12288:k0uI/f2CWjxdgKhkR/3z3q018CcGc44OmTv/mytaS10/9YR4bJ8dFY4Hs:1Xu/dgnR/iCQO6F8adu4M
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-