General
-
Target
Offer # E21016 - R1.pdf.exe
-
Size
175KB
-
Sample
221103-ny1n2acbbk
-
MD5
49212e72f4c7a6ea7c14c214d6d5dac6
-
SHA1
e274162f1070e92e64a7836e6fd013d1b8ba583a
-
SHA256
d5afe36401b247bc59fce44a33f1c4244e2d348665da758a8ffecbbfff3b58b2
-
SHA512
08b834a6891eae0578cce9ddbb7ee1d0062da5ba88ae3b5cd670b6b7fb8f5ae4b2ce3dfb366c1751954db7433e65ff22b9ac3d2aa9bf5c35fa86537298fdc95d
-
SSDEEP
3072:qUJoFfWzzl+cSMuajlIP7xQzv1yt2MvZLLPmLtbiXvH0TgjZm11tl80npoXW1sJ5:qweEpuUlIjxUytHvxLCAH0TfVnpofJe2
Static task
static1
Behavioral task
behavioral1
Sample
Offer # E21016 - R1.pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Offer # E21016 - R1.pdf.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
ydQaYkH6
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
ydQaYkH6
Targets
-
-
Target
Offer # E21016 - R1.pdf.exe
-
Size
175KB
-
MD5
49212e72f4c7a6ea7c14c214d6d5dac6
-
SHA1
e274162f1070e92e64a7836e6fd013d1b8ba583a
-
SHA256
d5afe36401b247bc59fce44a33f1c4244e2d348665da758a8ffecbbfff3b58b2
-
SHA512
08b834a6891eae0578cce9ddbb7ee1d0062da5ba88ae3b5cd670b6b7fb8f5ae4b2ce3dfb366c1751954db7433e65ff22b9ac3d2aa9bf5c35fa86537298fdc95d
-
SSDEEP
3072:qUJoFfWzzl+cSMuajlIP7xQzv1yt2MvZLLPmLtbiXvH0TgjZm11tl80npoXW1sJ5:qweEpuUlIjxUytHvxLCAH0TfVnpofJe2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-