General
-
Target
8dc1723626932ee38a29b7b47178de93.bin
-
Size
288KB
-
Sample
230615-b136qaec69
-
MD5
7645ad87259b1ed97ba70458368173ce
-
SHA1
9d2654b2afae86486b72807189fe719907090f26
-
SHA256
70c136ce417c50c95c3fb5bb0632f1b26771d4a17a4ce4271d064194257d6a25
-
SHA512
45fcc1361c81ba1c3df13971ab65a93762e8e4912dce008ec8f1f4966ff4a951dcb8d5247ea85f0893d61e3f76abe5af41d53ac9dd95a6bec650346905b8f8c0
-
SSDEEP
6144:smnIc1yzZwl36CUJpra3tDIN5pIdqdPeRvZ+sE2OoCT9:EHg6CUD+390pIdOP8vZ+1Pl
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice Notice_______pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Payment Advice Notice_______pdf.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5976535717:AAGnhDWJflLeGj6Q3T6Y7y8vS9xuOf0Yh-Q/
Targets
-
-
Target
Payment Advice Notice_______pdf.exe
-
Size
303KB
-
MD5
794f48174b0e3e14dacb53b964b57286
-
SHA1
07107477773e723c5d989def13b3848c7b662a87
-
SHA256
ec32dd2b2c64be623119540e7735fa6e53f94a5f1897887e9c92ebd564f74018
-
SHA512
764e91f2bcae93ff9d4039ac17a2078c88de077ad95bab8aa77ef35ca3ba7a1604a177fff59a66c107708dc3b43f1c999b63fa49ff82a954678d96cb583c7350
-
SSDEEP
6144:/Ya6tZ9r36xpKhGaCnt9qNNZI0H6wZ1LMMszrXhJafwN7cemtlP4ZSEE:/YfZ5qxpKhRVPgrRewN7cNV4MEE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-