General
-
Target
PO 0017709220.pdf (68KB).exe
-
Size
871KB
-
Sample
221208-wx565aaf88
-
MD5
94370cac5c6a71ef3b1ac252d8c2d1f0
-
SHA1
99e3a287c919446a51a29bb41b15e392381eb4d7
-
SHA256
5fe027cf78cba3c3e99db784eff2511d0d98b0f651fb840098f4a2a3f6c7ad60
-
SHA512
1a5a4123aae1036a29b20f559f1d0b78ff88fdceeb842106fdb27e34ff7e0a150f1e200ebd07bef56ba2b580b34eac4513e07719ab6ebc1482f9c7364ae3e431
-
SSDEEP
24576:X8DsTl9mUzgCzfsWfJHDxtMcKQ1Qj2SoYQi3:XAsT3dJltb1Qj6Yf
Static task
static1
Behavioral task
behavioral1
Sample
PO 0017709220.pdf (68KB).exe
Resource
win7-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5988122207:AAF1_KgDENpI5X2i7Phd669ok2u6BhL3kK0/
Targets
-
-
Target
PO 0017709220.pdf (68KB).exe
-
Size
871KB
-
MD5
94370cac5c6a71ef3b1ac252d8c2d1f0
-
SHA1
99e3a287c919446a51a29bb41b15e392381eb4d7
-
SHA256
5fe027cf78cba3c3e99db784eff2511d0d98b0f651fb840098f4a2a3f6c7ad60
-
SHA512
1a5a4123aae1036a29b20f559f1d0b78ff88fdceeb842106fdb27e34ff7e0a150f1e200ebd07bef56ba2b580b34eac4513e07719ab6ebc1482f9c7364ae3e431
-
SSDEEP
24576:X8DsTl9mUzgCzfsWfJHDxtMcKQ1Qj2SoYQi3:XAsT3dJltb1Qj6Yf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-