General
-
Target
SOA pdf.exe
-
Size
730KB
-
Sample
231011-vp9c5sch75
-
MD5
5b111640fcb0a5d04cb799078fe90bad
-
SHA1
80870524c77d40a9711a8c120bac5f27957617ec
-
SHA256
a0a83c6bc77fa73e06bc77a6bdd2e7d3b84319cff7f009d7f6ccc7fca5c48820
-
SHA512
c21cd618ab2050a65425e9c7f50bf3c449f63f37a8ba804f934188cad2f7afb99a0e89fbbd75013f19e59852b91051b34a08e35b6b3be69263c0a56e8d76bb32
-
SSDEEP
12288:o4X9K94CKeimRxlZSbr2Y7BSP93oxIUhB4+XWKXWBhO:o4tMHKiRxHSv97O3RaG+XFGD
Static task
static1
Behavioral task
behavioral1
Sample
SOA pdf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SOA pdf.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
host2069.hostmonster.com - Port:
587 - Username:
[email protected] - Password:
me!@#!@#!@#!@# - Email To:
[email protected]
Targets
-
-
Target
SOA pdf.exe
-
Size
730KB
-
MD5
5b111640fcb0a5d04cb799078fe90bad
-
SHA1
80870524c77d40a9711a8c120bac5f27957617ec
-
SHA256
a0a83c6bc77fa73e06bc77a6bdd2e7d3b84319cff7f009d7f6ccc7fca5c48820
-
SHA512
c21cd618ab2050a65425e9c7f50bf3c449f63f37a8ba804f934188cad2f7afb99a0e89fbbd75013f19e59852b91051b34a08e35b6b3be69263c0a56e8d76bb32
-
SSDEEP
12288:o4X9K94CKeimRxlZSbr2Y7BSP93oxIUhB4+XWKXWBhO:o4tMHKiRxHSv97O3RaG+XFGD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-