General
-
Target
4200576-pdf.js
-
Size
452KB
-
Sample
221123-rq9thscc7y
-
MD5
d0f6105fc7b9342bbc5c347ce6342b55
-
SHA1
7907a289d33206b8e197f21c1efdbe7de4e7aed8
-
SHA256
25b58db8013be3721ae96530f6d50e05bf78d4fa9a0af1638653b50045a9ebce
-
SHA512
1fcc5d682be6bc55f00878087a9576e2bdfaffad43073123c09b678decf08cfae943300dca5cfe2310b2a642fa5f448ccfdb1d3c3b580da9b049b8b51dfde525
-
SSDEEP
6144:OB2Mm09prVy25NU8pGs8IysHvXjwLGyIHEC6kNnB1bokDKoP99X+zzZ:1M3p59e8ssryOwLGjGkJP9W
Static task
static1
Behavioral task
behavioral1
Sample
4200576-pdf.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4200576-pdf.js
Resource
win10v2004-20220901-en
Malware Config
Extracted
Protocol: smtp- Host:
server240.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
Success4sure2day10@
Extracted
agenttesla
Protocol: smtp- Host:
server240.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
Success4sure2day10@ - Email To:
[email protected]
Targets
-
-
Target
4200576-pdf.js
-
Size
452KB
-
MD5
d0f6105fc7b9342bbc5c347ce6342b55
-
SHA1
7907a289d33206b8e197f21c1efdbe7de4e7aed8
-
SHA256
25b58db8013be3721ae96530f6d50e05bf78d4fa9a0af1638653b50045a9ebce
-
SHA512
1fcc5d682be6bc55f00878087a9576e2bdfaffad43073123c09b678decf08cfae943300dca5cfe2310b2a642fa5f448ccfdb1d3c3b580da9b049b8b51dfde525
-
SSDEEP
6144:OB2Mm09prVy25NU8pGs8IysHvXjwLGyIHEC6kNnB1bokDKoP99X+zzZ:1M3p59e8ssryOwLGjGkJP9W
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-