General
-
Target
HSBC Bank_ Payment Advice_PDF.exe
-
Size
553KB
-
Sample
230719-p4l89sfb66
-
MD5
9a46c55afbfaafeb5a710975268f68d9
-
SHA1
39f31f2c47e21899e7c6c915d046fe270347d8a4
-
SHA256
ee4f7a5d95e38e4ea5e0a7387ea99e0ef066f49261d685d5214f6e705d8a90e9
-
SHA512
c3d692bb8fd4e8416e2dea0cf4f4e97488987344321b9b0b4f34951490bd3394f5a2643c34f2f757b4824936f67d2af2a083433845a1f7eccd98387883e5b123
-
SSDEEP
12288:77u0EuGzcMz8Q+TjLGkzVaZpudWiE7++SiccCcn9+55j58BuAy6L:+0tGBoBT/FzVE0c7+ziclJAlL
Static task
static1
Behavioral task
behavioral1
Sample
HSBC Bank_ Payment Advice_PDF.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
HSBC Bank_ Payment Advice_PDF.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.umakarmaker.com.bd - Port:
587 - Username:
[email protected] - Password:
NLzLK#EsHVeS - Email To:
[email protected]
Targets
-
-
Target
HSBC Bank_ Payment Advice_PDF.exe
-
Size
553KB
-
MD5
9a46c55afbfaafeb5a710975268f68d9
-
SHA1
39f31f2c47e21899e7c6c915d046fe270347d8a4
-
SHA256
ee4f7a5d95e38e4ea5e0a7387ea99e0ef066f49261d685d5214f6e705d8a90e9
-
SHA512
c3d692bb8fd4e8416e2dea0cf4f4e97488987344321b9b0b4f34951490bd3394f5a2643c34f2f757b4824936f67d2af2a083433845a1f7eccd98387883e5b123
-
SSDEEP
12288:77u0EuGzcMz8Q+TjLGkzVaZpudWiE7++SiccCcn9+55j58BuAy6L:+0tGBoBT/FzVE0c7+ziclJAlL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-