General
-
Target
PROFORMA INV.pdf.exe
-
Size
661KB
-
Sample
230515-j2pnqahg6w
-
MD5
3d001a5535649fc075bf5f8badfd9dbd
-
SHA1
43144b7961725f461084f8798003ba94fb20a58c
-
SHA256
17fc4205571ea12188b9ed8b5659339e305ebc54bace4e3ba62c72c6b61cdfcf
-
SHA512
5136686e6fbc8e48f4103def7ab9996709080969c2b413d27c4010165cbc3f7b5284875fb1d8009a4115110ef64d9028659aee2a17d00bf250b6785ed7d1e622
-
SSDEEP
12288:UmYCfC6lnIFae5+clpuDUpmnjfArEO9UlPJB1F7RMUM:UmNq6lnIN+sVEjfAgRBJBT
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA INV.pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PROFORMA INV.pdf.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.businesssolutionstraining.com - Port:
587 - Username:
[email protected] - Password:
2ManyCharacters! - Email To:
[email protected]
Targets
-
-
Target
PROFORMA INV.pdf.exe
-
Size
661KB
-
MD5
3d001a5535649fc075bf5f8badfd9dbd
-
SHA1
43144b7961725f461084f8798003ba94fb20a58c
-
SHA256
17fc4205571ea12188b9ed8b5659339e305ebc54bace4e3ba62c72c6b61cdfcf
-
SHA512
5136686e6fbc8e48f4103def7ab9996709080969c2b413d27c4010165cbc3f7b5284875fb1d8009a4115110ef64d9028659aee2a17d00bf250b6785ed7d1e622
-
SSDEEP
12288:UmYCfC6lnIFae5+clpuDUpmnjfArEO9UlPJB1F7RMUM:UmNq6lnIN+sVEjfAgRBJBT
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-