General
-
Target
1BA102E51ABB2B30FA5856BE2213C315519FCA2B5F400EFDE38AA3C88DFFD681
-
Size
400KB
-
Sample
230518-cfne7shc54
-
MD5
4d90a84b93f9a603c7925a8050809493
-
SHA1
a0b67be4112520766bdd7b5940a997cc1f5af5f5
-
SHA256
1ba102e51abb2b30fa5856be2213c315519fca2b5f400efde38aa3c88dffd681
-
SHA512
0bb1069f7f92940d883fafef67afa5f5d9f63e381bd439c1954ea8c97b18b4aa092cab1f06074af62968c53ae1646c0847dfd8e8236288955f35fc0b26c81137
-
SSDEEP
1536:mD89r/aDcWJwG0mtvR/Eg5lq1laktrO8MmxqMsTMBhui:mqto
Static task
static1
Behavioral task
behavioral1
Sample
PDT9377823-735363563.PDF.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PDT9377823-735363563.PDF.vbs
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5361912293:AAGLRU8lOnvgedEVLW84nw6uJBR8KKRq6f4/
Targets
-
-
Target
PDT9377823-735363563.PDF.vbs
-
Size
339KB
-
MD5
50430be7e76cee93bfb67f638c45db24
-
SHA1
f367d92793ad4a7b6765a5ee2183a418c34c10a9
-
SHA256
88c4fd970ee45f12ab4b95370a2ceffa64dc27b0da5e181f5755532aad7010c5
-
SHA512
ae70b5fe2e4c110c6e7c5a2e4c38dae2a313630d8c4dc2cf0685986ad30a5d61a391d26422de228c015846f51ca2146d8db57aedc81fa95ae74432ba6dac8a44
-
SSDEEP
1536:j89r/aDcWJwG0mtvR/Eg5lq1laktrO8MmxqMsTMBhuiW:Kto/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-