General
-
Target
Booking_5136_05842pdf.exe
-
Size
144KB
-
Sample
230502-pf4teaba46
-
MD5
b97aada19fe2209c3fb0b4500409b67b
-
SHA1
9f2e99bd1c80df75e23f61e25db7b68e05854800
-
SHA256
e594f4113c4a110d4da926cbe62dc968a51e854ff346292e3156fd354f2e041d
-
SHA512
08741ff5366431bfd378785651406ac751c766d1d4ad66a4af131479c6bffb1270bb2c5162d44752b6c665244bf3eb9c20d111128ff347a5c4eef4de9c9c7af3
-
SSDEEP
1536:XgdoFYy1sRWQm41YjJKqdMYIYG9g5mYz6MGnxCikFy5e2Dos2TGSW7zwV2111x:Xgdop1id+MYIYG9L/xkMLUs2XWXwVM
Static task
static1
Behavioral task
behavioral1
Sample
Booking_5136_05842pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Booking_5136_05842pdf.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
logxtai.shop - Port:
587 - Username:
[email protected] - Password:
f9;2H%A)IpgE - Email To:
[email protected]
Targets
-
-
Target
Booking_5136_05842pdf.exe
-
Size
144KB
-
MD5
b97aada19fe2209c3fb0b4500409b67b
-
SHA1
9f2e99bd1c80df75e23f61e25db7b68e05854800
-
SHA256
e594f4113c4a110d4da926cbe62dc968a51e854ff346292e3156fd354f2e041d
-
SHA512
08741ff5366431bfd378785651406ac751c766d1d4ad66a4af131479c6bffb1270bb2c5162d44752b6c665244bf3eb9c20d111128ff347a5c4eef4de9c9c7af3
-
SSDEEP
1536:XgdoFYy1sRWQm41YjJKqdMYIYG9g5mYz6MGnxCikFy5e2Dos2TGSW7zwV2111x:Xgdop1id+MYIYG9L/xkMLUs2XWXwVM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-