General
-
Target
PO-23456543_pdf.xz
-
Size
330KB
-
Sample
221207-yh4e4afh35
-
MD5
cd45d8b8384ba2718f8a7117acb823bc
-
SHA1
4ee31d3cc8540de5f46e332719ff2ea25b2be359
-
SHA256
88c3470e6c376bd1918c78029367cd48dc213c6ed61a79cb3a193c5060de9624
-
SHA512
20dbe0e14860128d2f08e21f0b42bac4a81337022f038ecbd82896e30e5c34783d9114ee31c8c6cbc85c44b214dde2e96115fd68c20220a983441d5faa47cfeb
-
SSDEEP
6144:v7IGl3bQEMo8aEjQdYiIlpaKKRcMoBZ5t9DmGLhGTVwuIWq0llrmuDc5P/G2rJ:v7IGv89bpTKuv5PDhGTZs0llmuo5XG2F
Static task
static1
Behavioral task
behavioral1
Sample
PO-23456543_pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PO-23456543_pdf.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5801961827:AAHU2YhkfiXQwgVf7WnbO6mcJG_3zpTOec4/
Targets
-
-
Target
PO-23456543_pdf
-
Size
358KB
-
MD5
7db0bc0c978bda0048ac2944b9b86245
-
SHA1
66e87764ff09ebba04681cbc2c61a43cbfa595b5
-
SHA256
2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063
-
SHA512
a52b5044c908af4c404a5c4f3cf5764aac02f8af08bf7985f209a892a7e7e0e110e64201eadb8fb32b1594cb68cd88071911cb44cf2ae44ffa1b6bfea6fc8efb
-
SSDEEP
6144:LBnb2BEjQdYiIlpaaKRcMoBO5t9Dm/LhGTVwuIWqJllrmuDW5P/G2rb:FLbpxKuM5PqhGTZsJllmua5XG2rb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-