General
-
Target
PO_55192752_PDF___Exon_Trading_Corporation_Co_Ltd___iGST_eH2EET541mYaM.exe
-
Size
912KB
-
Sample
230605-pmzs2ahb3t
-
MD5
90e31e7770e4a7fd1be3c60e19e463b9
-
SHA1
d3bafc5ccfb9d77f68c8802a63afeb127ed63259
-
SHA256
5c17b8ee713dfaa8f831a6b6212f584c4c3ddeff92cb08a3ccdfc01b57621ec5
-
SHA512
149a488dd288f6ed616bb3ab3b2d71d3271847baf02184215c359e307cf7f040099c65da321d887d9c1175d4c77c2168e32c9c0d04e6e8495b4bb2954d36ed08
-
SSDEEP
24576:3MoIAHlWxMiQW/O4ue7NjvYfBq5btKH/XKWxpupTULOmLM70IyZ/A:lllYMiQWmS71WqKfaWxpueamYyZ/A
Static task
static1
Behavioral task
behavioral1
Sample
PO_55192752_PDF___Exon_Trading_Corporation_Co_Ltd___iGST_eH2EET541mYaM.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PO_55192752_PDF___Exon_Trading_Corporation_Co_Ltd___iGST_eH2EET541mYaM.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.rfconnactor.com - Port:
21 - Username:
[email protected] - Password:
E%DiZ2584_Zq
Extracted
Protocol: ftp- Host:
ftp.rfconnactor.com - Port:
21 - Username:
[email protected] - Password:
E%DiZ2584_Zq
Targets
-
-
Target
PO_55192752_PDF___Exon_Trading_Corporation_Co_Ltd___iGST_eH2EET541mYaM.exe
-
Size
912KB
-
MD5
90e31e7770e4a7fd1be3c60e19e463b9
-
SHA1
d3bafc5ccfb9d77f68c8802a63afeb127ed63259
-
SHA256
5c17b8ee713dfaa8f831a6b6212f584c4c3ddeff92cb08a3ccdfc01b57621ec5
-
SHA512
149a488dd288f6ed616bb3ab3b2d71d3271847baf02184215c359e307cf7f040099c65da321d887d9c1175d4c77c2168e32c9c0d04e6e8495b4bb2954d36ed08
-
SSDEEP
24576:3MoIAHlWxMiQW/O4ue7NjvYfBq5btKH/XKWxpupTULOmLM70IyZ/A:lllYMiQWmS71WqKfaWxpueamYyZ/A
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-