General
-
Target
payment copy.pdf.exe
-
Size
874KB
-
Sample
221207-yhkmzsah7t
-
MD5
19b12dc02fe474dead3c44c468554d6f
-
SHA1
9407e38cea8b04705f433a7cb91ec25fda611263
-
SHA256
3ccaf74f465a79ec320fdb7e44ae09551f4348efd3bf8bf7b3638cc0c1cd8492
-
SHA512
2ede1e930e060451ebba68396cca0eb4a7dd3c65a2b0039f87dd687a5f8876db58d14add581303de9ab890865fba312b0db1f3c2cc324bf9584a10993cec4ad3
-
SSDEEP
12288:knoQgKZ/nXt7virmWhlGLaQYImptNmkEcPbiZx8JCozVpSs8X45jOCXJWfBhib6S:kGNwK+EJCozno4RQZwbUIxxF/Xzr
Static task
static1
Behavioral task
behavioral1
Sample
payment copy.pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
payment copy.pdf.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.reousaomilia.gr - Port:
587 - Username:
[email protected] - Password:
nora2020! - Email To:
[email protected]
Targets
-
-
Target
payment copy.pdf.exe
-
Size
874KB
-
MD5
19b12dc02fe474dead3c44c468554d6f
-
SHA1
9407e38cea8b04705f433a7cb91ec25fda611263
-
SHA256
3ccaf74f465a79ec320fdb7e44ae09551f4348efd3bf8bf7b3638cc0c1cd8492
-
SHA512
2ede1e930e060451ebba68396cca0eb4a7dd3c65a2b0039f87dd687a5f8876db58d14add581303de9ab890865fba312b0db1f3c2cc324bf9584a10993cec4ad3
-
SSDEEP
12288:knoQgKZ/nXt7virmWhlGLaQYImptNmkEcPbiZx8JCozVpSs8X45jOCXJWfBhib6S:kGNwK+EJCozno4RQZwbUIxxF/Xzr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-