General
-
Target
PO_291122.PDF_Archongroup._Private_Ltd._Trading_Company_Limited_Signed_Copy.exe
-
Size
1.3MB
-
Sample
221208-qk3mksda9z
-
MD5
ebd4013eb82b87091d0b2e5c00ffe7af
-
SHA1
1789dc43ca3a2fcd7003627f618f9a66b8765940
-
SHA256
13e9af66505f8817a5bf39cbf9628adb924aa1110dbed4f27df8be1cffe8a7bf
-
SHA512
b0b3e6d763375d227cb76100c80b2380d36bed46c411491dda9480c0c81a1582fc7e3c281785e1c3c95b0343043c5ae7e61f4a5f3ef0ff09b463f83763b138e3
-
SSDEEP
24576:MY9jl9Qsa9PjK+gTeuDn+yIxhG8Z71pSsSNDeUfhZmBH0jPJmA:nj3QBZjte8Y8Z71pSneChSHuPJmA
Static task
static1
Behavioral task
behavioral1
Sample
PO_291122.PDF_Archongroup._Private_Ltd._Trading_Company_Limited_Signed_Copy.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
PO_291122.PDF_Archongroup._Private_Ltd._Trading_Company_Limited_Signed_Copy.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.brado-it.com - Port:
21 - Username:
[email protected] - Password:
AZApromax+
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.brado-it.com - Port:
21 - Username:
[email protected] - Password:
AZApromax+
Targets
-
-
Target
PO_291122.PDF_Archongroup._Private_Ltd._Trading_Company_Limited_Signed_Copy.exe
-
Size
1.3MB
-
MD5
ebd4013eb82b87091d0b2e5c00ffe7af
-
SHA1
1789dc43ca3a2fcd7003627f618f9a66b8765940
-
SHA256
13e9af66505f8817a5bf39cbf9628adb924aa1110dbed4f27df8be1cffe8a7bf
-
SHA512
b0b3e6d763375d227cb76100c80b2380d36bed46c411491dda9480c0c81a1582fc7e3c281785e1c3c95b0343043c5ae7e61f4a5f3ef0ff09b463f83763b138e3
-
SSDEEP
24576:MY9jl9Qsa9PjK+gTeuDn+yIxhG8Z71pSsSNDeUfhZmBH0jPJmA:nj3QBZjte8Y8Z71pSneChSHuPJmA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-