General
-
Target
Halkbank,pdf.exe
-
Size
845KB
-
Sample
221107-hw4p1sddb8
-
MD5
eb34442586cd975b248f9c5391399abe
-
SHA1
f9ed2d85ea52fb89442fb62f3710d70461da87a3
-
SHA256
86b07ab0bc47fe6d3436da9e06c413c7d4575057b0b4b25a7caf3595c4e1f38e
-
SHA512
9734fdc26873760b11ac88dba9e095ae50fd1866a91167f6c8d0163ca1d565477f3e86d18576aa9b628218ca7be60bd57a1b516b85bc7ec22d31472c890dd341
-
SSDEEP
12288:cVcIxQiC/ooGH1dvSJ4YSlnOLgTtTJX4F2lfO/Q7OPVRSWerc:cVcqMooGHTYSlnOLgT4F42/4OtYDrc
Static task
static1
Behavioral task
behavioral1
Sample
Halkbank,pdf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Halkbank,pdf.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5792996127:AAEo0wCCYZp60yQsf_X1P7t-T5AAK5KPYXY/
Targets
-
-
Target
Halkbank,pdf.exe
-
Size
845KB
-
MD5
eb34442586cd975b248f9c5391399abe
-
SHA1
f9ed2d85ea52fb89442fb62f3710d70461da87a3
-
SHA256
86b07ab0bc47fe6d3436da9e06c413c7d4575057b0b4b25a7caf3595c4e1f38e
-
SHA512
9734fdc26873760b11ac88dba9e095ae50fd1866a91167f6c8d0163ca1d565477f3e86d18576aa9b628218ca7be60bd57a1b516b85bc7ec22d31472c890dd341
-
SSDEEP
12288:cVcIxQiC/ooGH1dvSJ4YSlnOLgTtTJX4F2lfO/Q7OPVRSWerc:cVcqMooGHTYSlnOLgT4F42/4OtYDrc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-