General
-
Target
Quotes Specifications R2100131410_PDF.exe
-
Size
410KB
-
Sample
230206-kpbrrsgb8x
-
MD5
d0f0167747de9e85ece81cef22a569d7
-
SHA1
aeacddd1050c347e4ac27fdc65a2d7d5422c95e1
-
SHA256
894ca1dfeebe51eb320bd38a7da02c17e1937477a44cd4e8cf008f7a44fa7c3e
-
SHA512
90d58c5f8207d9bbf8a147edb6be2d0b4d676a34619d6e85736de3f5de938ee3fc7195883edfabfdec38f63ef03edce6faa0140a42a429e8fae3bb160543677f
-
SSDEEP
12288:yYXVBHN4C8x0ks0Ouuahj69YeeDtK0Y5tIv3G:yYXVBL8uks0OuNj69beY0Yov3G
Static task
static1
Behavioral task
behavioral1
Sample
Quotes Specifications R2100131410_PDF.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Quotes Specifications R2100131410_PDF.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.ravv.sk - Port:
587 - Username:
[email protected] - Password:
bfE#vKaMi#
Extracted
agenttesla
Protocol: smtp- Host:
mail.ravv.sk - Port:
587 - Username:
[email protected] - Password:
bfE#vKaMi# - Email To:
[email protected]
Targets
-
-
Target
Quotes Specifications R2100131410_PDF.exe
-
Size
410KB
-
MD5
d0f0167747de9e85ece81cef22a569d7
-
SHA1
aeacddd1050c347e4ac27fdc65a2d7d5422c95e1
-
SHA256
894ca1dfeebe51eb320bd38a7da02c17e1937477a44cd4e8cf008f7a44fa7c3e
-
SHA512
90d58c5f8207d9bbf8a147edb6be2d0b4d676a34619d6e85736de3f5de938ee3fc7195883edfabfdec38f63ef03edce6faa0140a42a429e8fae3bb160543677f
-
SSDEEP
12288:yYXVBHN4C8x0ks0Ouuahj69YeeDtK0Y5tIv3G:yYXVBL8uks0OuNj69beY0Yov3G
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-