General
-
Target
09bcaddf5bcdfbacea531402e71416310a536840af3b8318d9b533a621ad9121
-
Size
1.6MB
-
Sample
231121-tefseafd85
-
MD5
fe94255c3eb64051b260e638f6049b0b
-
SHA1
ab3d7fe8df71eee66ba844d4d5c03fc21e8a3f62
-
SHA256
09bcaddf5bcdfbacea531402e71416310a536840af3b8318d9b533a621ad9121
-
SHA512
36250dec29af59beec80520da18b5f94d90a9011412a1f0d136259266234927e92182a947a5747c976565c40c78bca94fa66aa39059855bccc6817ad06fedcf2
-
SSDEEP
49152:ujcPFcGkHZUKEXA0nqYbNJjZT+5GNQ3Yqy:ujcPqGxrTNfTjSoT
Static task
static1
Behavioral task
behavioral1
Sample
MT PEARL - T.PDF.js
Resource
win7-20231020-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6811423600:AAG2aeIaNsb7KhtKp1Js71i-PwGY1zN7uIg/
Targets
-
-
Target
MT PEARL - T.PDF.js
-
Size
5.8MB
-
MD5
07d87f8a2836402d7d6d121b4ac64850
-
SHA1
2643de7c438bd735d4730a40444fd41c2eca6712
-
SHA256
d65d4a47bce8ac5360c92d4be30d043207c6d6d39b9b2709bf37b9b23a7b5835
-
SHA512
5dc8a13c2235ba5496f95be0310e38b4498fe3113cd7534cd6c18dd52176fcf36a31944a5822a2962624d8ae0e0f9930ca0ea2a5a3531c823ab7eaf16e0ca966
-
SSDEEP
24576:2nZ2HSB9a3Z6opVwL2EnWfPyAIbjnwYh88Y/tIT0L66ZTF8hi/tbUDfkPwcAeZQw:Ea5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-