General
-
Target
SOA pdf.rar
-
Size
609KB
-
Sample
230919-gj6heahc24
-
MD5
593023599b06ed51c011af0e1f0931ad
-
SHA1
57c3e88be5eb1fdc5770951c4211a090c60c207d
-
SHA256
d378230fdfb7e17abf665720c659193a84b57d1605a6c78ad403d1e9e8c01ec1
-
SHA512
970510301f6b23485c3443b038fc14ff635b6d60663705ce8e8b3726496705af8ffe1d3cfd2e0a9c5346d082f06bf1431054685e67f6064a0eff04888deeada0
-
SSDEEP
12288:kZTXhOIaDM3AGB2jCfpo/y6Bfau+PNrbxUNqEt6WnGw688Al:YTAcijCAf8iNqDWGwTLl
Static task
static1
Behavioral task
behavioral1
Sample
SOA pdf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SOA pdf.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
host2069.hostmonster.com - Port:
587 - Username:
[email protected] - Password:
me!@#!@#!@#!@# - Email To:
[email protected]
Targets
-
-
Target
SOA pdf.exe
-
Size
684KB
-
MD5
ef016c57887c795245f3c993844050b1
-
SHA1
a01a18332c13b3fea59c7ff5b2c0efe89811c5ee
-
SHA256
19e6653f249d7283999ba5be8b4154ccf64693cf228c7f7b4fde670f9fbed711
-
SHA512
ef833dda1825b56120174e8c79edb371ee6e3441b384d623d198e8968250bd7cc08c475c00cd30656d8300735c3da308019a9d1f10b8ff324ab054e409541b15
-
SSDEEP
12288:p4YpAfDuHOXEjxlubLoPpoL6HrOngIVGYm9qv28y6+Jz1g5:GYpgOjxlioxXHrOg89vRy62O
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-