General
-
Target
payment copy.pdf.z
-
Size
646KB
-
Sample
221208-s9yq2aad73
-
MD5
c7a11a7fd3c8e42e8d16265a2cc12f5d
-
SHA1
f0b9a51e3f5f27a6290d5bac7aae3b251c386655
-
SHA256
37da8f89540f4dae114f1f55cfd4d89be9582fbd480ac6ed6c34ac04ec8d576b
-
SHA512
0e3524d9b9a9bbea25b01ba7cab8c06d975066f6e6af08a36666c05123f385c8363cb5b412d23bd5960acc1ad989b27063a3e1704e3661d1ba66bf64e9524e18
-
SSDEEP
12288:jiE0YCjbwMh6ny+h+n6SN/PAQDnNNTtcvCEYLPQE5FiER3RiSbhXwS:eE3K0Mh6nyU+6SOQ77lPQaFpbeS
Static task
static1
Behavioral task
behavioral1
Sample
payment copy.pdf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
payment copy.pdf.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.reousaomilia.gr - Port:
587 - Username:
[email protected] - Password:
nora2020! - Email To:
[email protected]
Targets
-
-
Target
payment copy.pdf.exe
-
Size
874KB
-
MD5
19b12dc02fe474dead3c44c468554d6f
-
SHA1
9407e38cea8b04705f433a7cb91ec25fda611263
-
SHA256
3ccaf74f465a79ec320fdb7e44ae09551f4348efd3bf8bf7b3638cc0c1cd8492
-
SHA512
2ede1e930e060451ebba68396cca0eb4a7dd3c65a2b0039f87dd687a5f8876db58d14add581303de9ab890865fba312b0db1f3c2cc324bf9584a10993cec4ad3
-
SSDEEP
12288:knoQgKZ/nXt7virmWhlGLaQYImptNmkEcPbiZx8JCozVpSs8X45jOCXJWfBhib6S:kGNwK+EJCozno4RQZwbUIxxF/Xzr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-