General
-
Target
Payment advis pdf.scr.exe
-
Size
375KB
-
Sample
221121-q89e2acd82
-
MD5
c841e0d1d9238121a768bceb6339f5c9
-
SHA1
62d9cfda2108525125a795467c62cda564c6ebb5
-
SHA256
2cf36ac3e8c07fcbeb2ec52dd992d2722aa68305db8d5a1dee9be0b6ccd186ef
-
SHA512
3834eb7529313c7653d46716790620c982f0a933fcabc4be1c37554b6bb198bd726f4dfaee0ee9b338c2f5d51a07294cd7c509b13f5ba78dc4cba3e5cdd782cc
-
SSDEEP
6144:ZVGdx6x2FUdnyePvRqloupOCaDU+tnvqtxKarFZJDJyUsN/hvRB7y:HtdyePvRTupTaDU+tvc3rpJslhj+
Static task
static1
Behavioral task
behavioral1
Sample
Payment advis pdf.scr.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Payment advis pdf.scr.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.mcmprint.net - Port:
21 - Username:
[email protected] - Password:
l9Hh{#_(0shZ
Targets
-
-
Target
Payment advis pdf.scr.exe
-
Size
375KB
-
MD5
c841e0d1d9238121a768bceb6339f5c9
-
SHA1
62d9cfda2108525125a795467c62cda564c6ebb5
-
SHA256
2cf36ac3e8c07fcbeb2ec52dd992d2722aa68305db8d5a1dee9be0b6ccd186ef
-
SHA512
3834eb7529313c7653d46716790620c982f0a933fcabc4be1c37554b6bb198bd726f4dfaee0ee9b338c2f5d51a07294cd7c509b13f5ba78dc4cba3e5cdd782cc
-
SSDEEP
6144:ZVGdx6x2FUdnyePvRqloupOCaDU+tnvqtxKarFZJDJyUsN/hvRB7y:HtdyePvRTupTaDU+tvc3rpJslhj+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-