General
-
Target
Invoice-pdf.exe
-
Size
361KB
-
Sample
240429-ler7fafe9z
-
MD5
04707a5d98749041c7a334c9fd5197de
-
SHA1
c109facbc0d1adcd06c2f0f7f1619fe09c9ea173
-
SHA256
dbeb0eff645a95950db00e804ee3b64d6e779bdf0f1979ebf0c1710471b9c94c
-
SHA512
a2f6dd2317477f0c7a93edddcf10b8bb211a75a34e70b92caa5d08342e82a57fe69a46eea232416c6af147d71fcff6172e41dbf57b37c96329e06228dce6705a
-
SSDEEP
6144:X2b0HXNs1UYXs2M3dLkir563KIWIEu73ndFrWRyZv3enCx2xzwT7SkOtpQ39F:/y1ZXs2K7rAhdEmNFiwGCxpH
Static task
static1
Behavioral task
behavioral1
Sample
Invoice-pdf.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Invoice-pdf.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
premium162.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
Success4sure2day10@ - Email To:
[email protected]
Targets
-
-
Target
Invoice-pdf.exe
-
Size
361KB
-
MD5
04707a5d98749041c7a334c9fd5197de
-
SHA1
c109facbc0d1adcd06c2f0f7f1619fe09c9ea173
-
SHA256
dbeb0eff645a95950db00e804ee3b64d6e779bdf0f1979ebf0c1710471b9c94c
-
SHA512
a2f6dd2317477f0c7a93edddcf10b8bb211a75a34e70b92caa5d08342e82a57fe69a46eea232416c6af147d71fcff6172e41dbf57b37c96329e06228dce6705a
-
SSDEEP
6144:X2b0HXNs1UYXs2M3dLkir563KIWIEu73ndFrWRyZv3enCx2xzwT7SkOtpQ39F:/y1ZXs2K7rAhdEmNFiwGCxpH
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-