General
-
Target
Urgent New Inquiry RFQ_Pdf.bat
-
Size
1017KB
-
Sample
231011-hbzkkafb9t
-
MD5
38d8ff52d35e7fab1fa3a10413e11570
-
SHA1
3de93044807a42c01ff9030c3dc3381bea6dd643
-
SHA256
1820201900ef3644a747983b322ca8c63c48362a4e9590b719ec824e5930f642
-
SHA512
19f3ce4203e679cf65ad8df86dd2344b3b83603a6c6c1411f715386cdbc236bbea6f5c5f4f87de7f7cb438f4eee601506649bb8abb7bc6c2ba30efd74c1b31d3
-
SSDEEP
24576:zCNjF5S1Hvjspl5HEUe0Ek0DUMLDFFS7K03pWlWIyJQL:GNuvBWgHoW0If
Static task
static1
Behavioral task
behavioral1
Sample
Urgent New Inquiry RFQ_Pdf.bat
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Urgent New Inquiry RFQ_Pdf.bat
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6568247464:AAHsSOES5pRueRqAlbG1bx5hx02y4of2d_Q/
Targets
-
-
Target
Urgent New Inquiry RFQ_Pdf.bat
-
Size
1017KB
-
MD5
38d8ff52d35e7fab1fa3a10413e11570
-
SHA1
3de93044807a42c01ff9030c3dc3381bea6dd643
-
SHA256
1820201900ef3644a747983b322ca8c63c48362a4e9590b719ec824e5930f642
-
SHA512
19f3ce4203e679cf65ad8df86dd2344b3b83603a6c6c1411f715386cdbc236bbea6f5c5f4f87de7f7cb438f4eee601506649bb8abb7bc6c2ba30efd74c1b31d3
-
SSDEEP
24576:zCNjF5S1Hvjspl5HEUe0Ek0DUMLDFFS7K03pWlWIyJQL:GNuvBWgHoW0If
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-