General
-
Target
Approved E-DO PDF.rar
-
Size
637KB
-
Sample
240502-qq8e1sca43
-
MD5
a1ec77271287f41a17afdabdc3d2269a
-
SHA1
9a07780f0885e12ab9a8f7e2d4493048879353f9
-
SHA256
21a6150f936a6e5a0771a0f1e9f4ee829c39de4f04d36c04eb5c2dace6e46987
-
SHA512
9919668c9d49352cc7ef06ab479ac4a6c4091f1e3d6b68ffbea9e04cfacdd9b12b22b1f803682b29570ada50ac73784f08bebd48c2ab0aacaf8812ccd92232cd
-
SSDEEP
12288:2rMqCscVhmISZj+6DHPD9xPWraW0OVxuB8/cSZuO0Esb+viAmuWkA:2rMqomIYj+6rL9ZI0OHu6/cSuK68A
Static task
static1
Behavioral task
behavioral1
Sample
Approved E-DO PDF.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Approved E-DO PDF.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cojosem.com - Port:
587 - Username:
[email protected] - Password:
ZARHLOULBOSS123 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.cojosem.com - Port:
587 - Username:
[email protected] - Password:
ZARHLOULBOSS123
Targets
-
-
Target
Approved E-DO PDF.exe
-
Size
698KB
-
MD5
ccd1edccbd14c9c0245099ac2920be83
-
SHA1
77a57f47e0660da5a2a1969392cf0aa962c5eed8
-
SHA256
56f69825010da76642ee25cf55098c51f6ded6f6fe2718b6c69c1c4b74b57c65
-
SHA512
af3b651c6cbd0752b001264b0ecbf7f254af2ae832b9d862f99b5fa818f540254c878b7b64d0f422e12029890584094fef73cf56c1ed5aa82dfe1e2fd77a0c47
-
SSDEEP
12288:JO3/T3/fVrTtK3/y32K4J8wqCfqIP5Otr7VnYixibuRtgiTn+aEoQG527KCHftop:srXVrTtKqmfqClP5OVdY0iqRKuEG52er
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-