General
-
Target
eurdvswiftsend_30082315823613_pdf.exe
-
Size
659KB
-
Sample
230904-jhxj8afa69
-
MD5
a9c1c56a42de4df874d9faefa5e8b14a
-
SHA1
835b27ae359dc86c133748de9e1a00be7f7167ad
-
SHA256
631c44548b7bc8c13c2a2025275f90842523dacd60046eeabea9c3da8d20c926
-
SHA512
d4525fe8e7ede099f11cf8f17736cf02a34ff8b40f6d324d0a5ec616ef2e75307e84a0b95ebb363fef7ea5633f653240e84d8be00faf16804bac9d50fe60e76a
-
SSDEEP
12288:2JfOZ1734F6vh9rLMPQu0VXjEw4PJn+wH4AtY4DwP9FHCKuSzdJG:uWZBE659roPd0NT4PpP4A64G9sQ
Static task
static1
Behavioral task
behavioral1
Sample
eurdvswiftsend_30082315823613_pdf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
eurdvswiftsend_30082315823613_pdf.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.kowalskiokna.pl - Port:
587 - Username:
[email protected] - Password:
artgeruhst75g - Email To:
[email protected]
Targets
-
-
Target
eurdvswiftsend_30082315823613_pdf.exe
-
Size
659KB
-
MD5
a9c1c56a42de4df874d9faefa5e8b14a
-
SHA1
835b27ae359dc86c133748de9e1a00be7f7167ad
-
SHA256
631c44548b7bc8c13c2a2025275f90842523dacd60046eeabea9c3da8d20c926
-
SHA512
d4525fe8e7ede099f11cf8f17736cf02a34ff8b40f6d324d0a5ec616ef2e75307e84a0b95ebb363fef7ea5633f653240e84d8be00faf16804bac9d50fe60e76a
-
SSDEEP
12288:2JfOZ1734F6vh9rLMPQu0VXjEw4PJn+wH4AtY4DwP9FHCKuSzdJG:uWZBE659roPd0NT4PpP4A64G9sQ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-