General
-
Target
97b79c84a7ef9ba88708ffffab269e9504838adb8f0706f0fedaed416107cd12
-
Size
581KB
-
Sample
231201-bd69vsde21
-
MD5
ea0a6b16942433391e25988ec0bd62dd
-
SHA1
56365baf672074757ffacefe205530100a710d2d
-
SHA256
97b79c84a7ef9ba88708ffffab269e9504838adb8f0706f0fedaed416107cd12
-
SHA512
3278aae2eb779ba6d0081f394e623b7c12137f66bdf2bd2b01e1d5ae2b08f033b482b6b56d91ff3af6249e3ea0d7285473fc7fc95ca709b1ccb3b95578214869
-
SSDEEP
12288:YG/N+6M8PsTqbFss6mBtLY9v3ReI1NiiD+rcWiKuVIs8:YGl+6M8PZdAvhe8siDFZVIs8
Behavioral task
behavioral1
Sample
Shipping Document TS-5233/Shipping Document TS-5233.PDF.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Shipping Document TS-5233/Shipping Document TS-5233.PDF.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6760916656:AAFTROumNysgqsjoqAvyBqjbR9y3VV4we2Y/
Targets
-
-
Target
Shipping Document TS-5233/Shipping Document TS-5233.PDF.exe
-
Size
1.1MB
-
MD5
d74e5c2edfe1a18ce82b14967ea4c5ee
-
SHA1
a46bf8e1a64294c40a6462f968cc571b664ba95a
-
SHA256
3947be8ac05c349d48d12ed94b71afb95fccf43cab810889159b9b0484a441f8
-
SHA512
f21ab4f538d87d419a84dd56806b190a02c6bcc67bdb96acedb1e845135cfd9178b32be8aaa8fa9d457dd7119f07bea5f0a4f2d36a3d38502998c685d4cb9e33
-
SSDEEP
12288:njYmca+sMEi6S4n09Y+N4OAZqZ3zLM6R+mnvMy8c9jFLKo9vJhee/3BqHOMbuZTo:UwjUL++9j/e7L8CifrXnHIs
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect PureLogs payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-