General
-
Target
TNT Invoice_pdf.exe
-
Size
404KB
-
Sample
221125-h7vw9aag37
-
MD5
f80abe76555b4a785cc99f5c28b005c2
-
SHA1
85748a350dc49454ff17845fd8275d065bc73229
-
SHA256
1934d67c56986a33cc6a786899f4bca45886ef7ddcb1abcab4a8061e0abe1a5d
-
SHA512
f415e6df708bed4fd7dbc443c13f23381cf1bc256d8f82922cbcb653fe131f000cbb38a207c032961673d6f8aab796e0e83f46899c5067ddecc28ced9ccdc9ae
-
SSDEEP
6144:LBnb2khrC61MSvEufUEWS+jahhoaU0HEpah8yLAw2QA8ffkXF9Lq3IXxjnGi/He4:FnhSoU3jahhvTHCe8Ad2QA8iTqexH+/g
Static task
static1
Behavioral task
behavioral1
Sample
TNT Invoice_pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
TNT Invoice_pdf.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5731015181:AAEnN7QEEeN_fBCr0YFv_H7lrNpKS_lkspI/sendDocument
Targets
-
-
Target
TNT Invoice_pdf.exe
-
Size
404KB
-
MD5
f80abe76555b4a785cc99f5c28b005c2
-
SHA1
85748a350dc49454ff17845fd8275d065bc73229
-
SHA256
1934d67c56986a33cc6a786899f4bca45886ef7ddcb1abcab4a8061e0abe1a5d
-
SHA512
f415e6df708bed4fd7dbc443c13f23381cf1bc256d8f82922cbcb653fe131f000cbb38a207c032961673d6f8aab796e0e83f46899c5067ddecc28ced9ccdc9ae
-
SSDEEP
6144:LBnb2khrC61MSvEufUEWS+jahhoaU0HEpah8yLAw2QA8ffkXF9Lq3IXxjnGi/He4:FnhSoU3jahhvTHCe8Ad2QA8iTqexH+/g
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-