General
-
Target
Halkbank_Ekstre_20191102_073809_405251-PDF.exe
-
Size
628KB
-
Sample
230414-mhm8bsah7x
-
MD5
765dc6f495fa3f41195f2946cbfc1086
-
SHA1
8c356c302cf5c77c2d4c48bfc4c6310a2bf36925
-
SHA256
642caac35b91c7f6346536161060cb7f06ad8e5849ba771eafb0b247447bb64f
-
SHA512
ddd6d3506019edc6c4ab2a19e2a46fc212f38dfa7c956074bed924661358f4876ac6cbe9eb467a6053c2f7fa234fccfc2a86e59285c2696e66e11e26fa4e6794
-
SSDEEP
6144:kYa6bhk1nNYvjh9ot9XgnBfkuejsgCQJ4AFK3JRw9eo8zz9u:kYXsnNMDoLX4/ejsgChRXfz9u
Static task
static1
Behavioral task
behavioral1
Sample
Halkbank_Ekstre_20191102_073809_405251-PDF.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Halkbank_Ekstre_20191102_073809_405251-PDF.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6199425271:AAHmRQWoG9dsWuMn08O_yjuqKOUZFeIKLIo/
Targets
-
-
Target
Halkbank_Ekstre_20191102_073809_405251-PDF.exe
-
Size
628KB
-
MD5
765dc6f495fa3f41195f2946cbfc1086
-
SHA1
8c356c302cf5c77c2d4c48bfc4c6310a2bf36925
-
SHA256
642caac35b91c7f6346536161060cb7f06ad8e5849ba771eafb0b247447bb64f
-
SHA512
ddd6d3506019edc6c4ab2a19e2a46fc212f38dfa7c956074bed924661358f4876ac6cbe9eb467a6053c2f7fa234fccfc2a86e59285c2696e66e11e26fa4e6794
-
SSDEEP
6144:kYa6bhk1nNYvjh9ot9XgnBfkuejsgCQJ4AFK3JRw9eo8zz9u:kYXsnNMDoLX4/ejsgChRXfz9u
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-