General
-
Target
a1ec77271287f41a17afdabdc3d2269a.bin
-
Size
638KB
-
Sample
240504-b3z7vada52
-
MD5
1bbc764f8d00d120d0bf1c9748825d0e
-
SHA1
a296db2339e6f51ab9227b15e50c76314d6ec1d6
-
SHA256
7a316d013e1222bf4cd97332497b8e62e2023cbc0648f9224ec0ac7dc0dd2375
-
SHA512
f1360d5ef37d9053357449addbd813e8ad5420aad82f0647f4fa4c34e71a36e9d648881103ae5d8947ebef374698f10720d2c98fbdc89b2828c975bef61b120a
-
SSDEEP
12288:+x/WjSP2845anaSaA/fETZI227o5jf6Ya1r7pLCgX/MdBHPe7oiSi4RDUgnz:+xu184InLyZIsJyYaZZCgXUdkolRRAgz
Static task
static1
Behavioral task
behavioral1
Sample
Approved E-DO PDF.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Approved E-DO PDF.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cojosem.com - Port:
587 - Username:
[email protected] - Password:
ZARHLOULBOSS123 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.cojosem.com - Port:
587 - Username:
[email protected] - Password:
ZARHLOULBOSS123
Targets
-
-
Target
Approved E-DO PDF.exe
-
Size
698KB
-
MD5
ccd1edccbd14c9c0245099ac2920be83
-
SHA1
77a57f47e0660da5a2a1969392cf0aa962c5eed8
-
SHA256
56f69825010da76642ee25cf55098c51f6ded6f6fe2718b6c69c1c4b74b57c65
-
SHA512
af3b651c6cbd0752b001264b0ecbf7f254af2ae832b9d862f99b5fa818f540254c878b7b64d0f422e12029890584094fef73cf56c1ed5aa82dfe1e2fd77a0c47
-
SSDEEP
12288:JO3/T3/fVrTtK3/y32K4J8wqCfqIP5Otr7VnYixibuRtgiTn+aEoQG527KCHftop:srXVrTtKqmfqClP5OVdY0iqRKuEG52er
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-