General
-
Target
new-order_20191102_073809_405251-PDF.exe
-
Size
730KB
-
Sample
230419-kh522abc2w
-
MD5
4befd99de8dedfeeb5cc7062663f561e
-
SHA1
670fa767ca9a9944896d98c1c14a05529c5579f7
-
SHA256
b4360f2d64d4b59c5dd1b56ccb7ed8233eeddd871fff3dd4ca9f9bead820cdb8
-
SHA512
9d990e844d00bf8c6df40f7d415911c7f946d9e9cd2c5bc627ce29b9e5174bf3308b22ceb84954e00c5364b0759165347cec79e624468aa953658799717f3cc0
-
SSDEEP
12288:UY+IO6T88SoOiIiKApCq6/6mNGH3igjDrnLSmvc+0ZV7WYJgqFI:UY+/288bOMB0Nq3rDZc+wgZ
Static task
static1
Behavioral task
behavioral1
Sample
new-order_20191102_073809_405251-PDF.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
new-order_20191102_073809_405251-PDF.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6261006732:AAFiMpPz79k5Wkkw0xvICpfaipqXFQbQmmo/
Targets
-
-
Target
new-order_20191102_073809_405251-PDF.exe
-
Size
730KB
-
MD5
4befd99de8dedfeeb5cc7062663f561e
-
SHA1
670fa767ca9a9944896d98c1c14a05529c5579f7
-
SHA256
b4360f2d64d4b59c5dd1b56ccb7ed8233eeddd871fff3dd4ca9f9bead820cdb8
-
SHA512
9d990e844d00bf8c6df40f7d415911c7f946d9e9cd2c5bc627ce29b9e5174bf3308b22ceb84954e00c5364b0759165347cec79e624468aa953658799717f3cc0
-
SSDEEP
12288:UY+IO6T88SoOiIiKApCq6/6mNGH3igjDrnLSmvc+0ZV7WYJgqFI:UY+/288bOMB0Nq3rDZc+wgZ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-