General
-
Target
nORDINE NR.2220271_pdf .img
-
Size
116KB
-
Sample
230706-txvz2sda47
-
MD5
84ca114adc2e3cc0d20dff9e3a970b07
-
SHA1
85cb46ce6650099e2866bb79747d0d38cc05095b
-
SHA256
e1d9ae35e325332ca3f13f2af7280b73670fdc1c613766a3661d677feb8e9948
-
SHA512
5b1deb7f2ce09e1f04f81ccfd5d4160495922245e4457d6c4b8cf059b91c07e6d978990f7f2afbf523200cea5bf6a3fab72723675fcfe51162a28c7c8910057a
-
SSDEEP
1536:rDK6/IHynUYwL+T777777KnsgQlVnvoChRYjKKP6NEPFb6OQ3ZvtbdRJ4Ag9A1Ia:rpl9h4q
Static task
static1
Behavioral task
behavioral1
Sample
ORDINE NR.2220271_pdf .exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
ORDINE NR.2220271_pdf .exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5908734844:AAHv_uYzRtOYIrQTIiI22TTdMRg47D4-L_k/
Targets
-
-
Target
ORDINE NR.2220271_pdf .exe
-
Size
55KB
-
MD5
671c069ce0dc53ade06388a310f44b26
-
SHA1
cb6b9bc9826a6f5cf037b3bdf4863d83fac2f0c4
-
SHA256
bc60b1409a79cd008bd4f8a2d6337a391a93bbdfe6eeac374c1defedcd8dbb30
-
SHA512
e8082d4bd604bc80ec699eb48a9dd8cb6c0838e53595e58f2a6b199bcc342cd6c2d0b2c61c2571d66b94b8439613151b047949efbfc8fe679c2c5f51cf6a2161
-
SSDEEP
1536:tDK6/IHynUYwL+T777777KnsgQlVnvoChRYjKKP6NEPFb6OQ3ZvtbdRJ4Ag9A1Ia:tpl9h4q
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-