General
-
Target
45ead9ca274b18b987506c5b62b21ad4.unknown
-
Size
2.3MB
-
Sample
240106-l49g1sdbgr
-
MD5
45ead9ca274b18b987506c5b62b21ad4
-
SHA1
65562400b81491ddf832794c3c2ffb8b78977bb4
-
SHA256
f936f3df58fe783f2b89a3e836e77727399c86fce62541e46ece8ad3039645b8
-
SHA512
1ba05f3fb36a0b3cccbf9b0088331e96655610f0ba70784a9d0fc0469ad5f209b66198cc4407e772a30c737528b1249f0eaf2c49ad0adc5ce0af8b2e543595e0
-
SSDEEP
24576:NQElKJE5AMeTEzW61eV3RGg80SsD8AxAH2AAPAlAAAAvAxAAA2mAAlAAAYAIAA5A:NQSq2JK6KV80SsD3
Static task
static1
Behavioral task
behavioral1
Sample
comprobante.pdf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
comprobante.pdf.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
serv-10708.handsonwebhosting.com - Port:
587 - Username:
[email protected] - Password:
icui4cu2@@
Targets
-
-
Target
comprobante.pdf.exe
-
Size
1.1MB
-
MD5
36caa90ad7983f4d019e45ffe4563f96
-
SHA1
375af942d0e826b9bdd8213284790f3f88695f6e
-
SHA256
460466b4bd3a9389f45e255c2dc48bc49f59cea7ed45f10f1b052442bb8e8175
-
SHA512
ffd0924b4eebb237f25a7421f7f33176a96d51371b710e169255553691efda93648b535b68d273fe83a43364b33d575bc3af789de0db6aa80d72ebe4d6f1febc
-
SSDEEP
12288:cne8ES7hCJH213UvLYu6fMxnbsEBEXPCtnJUcVpt34gv0ZGmgkddP63FRPRVmn:IEzJ64k9ExbsEBE6tJUcVpt34I01gkd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-