General
-
Target
98ba6d12a47efec655e2112c9a2727007103ebb37afe8b07fec7ccdbf071c4af
-
Size
608KB
-
Sample
231204-h9ecaahf2x
-
MD5
b3b69978d30ef5c8829f9807346a3bed
-
SHA1
3573b691af65e891b4d194481b2d04a16e0ce18d
-
SHA256
98ba6d12a47efec655e2112c9a2727007103ebb37afe8b07fec7ccdbf071c4af
-
SHA512
c95581b3ef3c6db384da8afe91b6dc2825f9a6e09f1a971e6910e14ced4a27a56b904f3fc20348fd2735436be156bc224edbad22b59fb3d06d723f2dc71f62cc
-
SSDEEP
12288:pTCbAF6mXRuFQmBZeiB89ApT6M58iioezg23Sp/2/uTH60jrT1:1CbA5RuF1feuOM58ianCp/2GTa6
Static task
static1
Behavioral task
behavioral1
Sample
Halkbank_Ekstre_0230622_073809_405251-pdf.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Halkbank_Ekstre_0230622_073809_405251-pdf.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rolexlogisticsservice.com - Port:
587 - Username:
[email protected] - Password:
2u]jWuxLcbdA - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.rolexlogisticsservice.com - Port:
587 - Username:
[email protected] - Password:
2u]jWuxLcbdA
Targets
-
-
Target
Halkbank_Ekstre_0230622_073809_405251-pdf.exe
-
Size
682KB
-
MD5
28e84214d01c73f8ea58167ee4e15245
-
SHA1
7e35fac510a67e18a382807ed3582488c1aa2a5c
-
SHA256
f7d7dc0b75fcd11b825c2447278e540332c1a0a927a4559ae9494828fe0d1a88
-
SHA512
51d151c52ccd481608023a467bf0226a5b290913307d76724025aa0edfaaae0b2f7a17350d8942a8180bfe90466e11f2ce5bcefd377e4aaa52b4cd3ab1dfde33
-
SSDEEP
12288:TA45+po2KJTXRubQYBBMiB09ApT6M58iSoezgJcDlrLVPjnbwR7KouL8mRfJuO:Tj+pJKdRub9NiuOM58iq8cDlrJbERP+b
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-