General
-
Target
Bank Slip.pdf.exe
-
Size
309KB
-
Sample
230606-p87qrsec3s
-
MD5
2d843bf940124944952caa0fbedd0251
-
SHA1
ec389cbe70ffa5453c333af8b2f1fe820c0c337d
-
SHA256
77644c9d032645a91eb6b269e9fe3abd3c5821a7911d5214dd295f2c49e448d1
-
SHA512
2e6db2459ea80ce3b1473e4bf8a49d647e4bbad22f91cb0beb6de31c28806db825fafa84dc11c4a7fbf4123f428afcc8f0644c526c4a66c2628c7b7a6dcf9ff5
-
SSDEEP
3072:5fY/TU9fE9PEtu13b3eGFx9jQsYJCWnhw0YDdV2dlCQCTTlOyZA9nThCmvsA8KLz:lYa6DrtjkCyhcq8lONTAjmknu9O1OuO
Static task
static1
Behavioral task
behavioral1
Sample
Bank Slip.pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Bank Slip.pdf.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6184523987:AAFjV1tTVCqtXbOZ1gFQ2WG41XJuZlG6NkQ/
Targets
-
-
Target
Bank Slip.pdf.exe
-
Size
309KB
-
MD5
2d843bf940124944952caa0fbedd0251
-
SHA1
ec389cbe70ffa5453c333af8b2f1fe820c0c337d
-
SHA256
77644c9d032645a91eb6b269e9fe3abd3c5821a7911d5214dd295f2c49e448d1
-
SHA512
2e6db2459ea80ce3b1473e4bf8a49d647e4bbad22f91cb0beb6de31c28806db825fafa84dc11c4a7fbf4123f428afcc8f0644c526c4a66c2628c7b7a6dcf9ff5
-
SSDEEP
3072:5fY/TU9fE9PEtu13b3eGFx9jQsYJCWnhw0YDdV2dlCQCTTlOyZA9nThCmvsA8KLz:lYa6DrtjkCyhcq8lONTAjmknu9O1OuO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-