General
-
Target
ae5e7576e3e268c5d301cd653b540412fca6e6b5a5f8efc611a995fc36933510
-
Size
1.4MB
-
Sample
240616-bp2hratbpb
-
MD5
1074cca9f1013110840d588e2b72f1ff
-
SHA1
8260d41c9e0708b28f17467792096a7f8b75d30e
-
SHA256
ae5e7576e3e268c5d301cd653b540412fca6e6b5a5f8efc611a995fc36933510
-
SHA512
dc5c2a7e981a533634ca34274e85a3ff41a015b1b5fb265ac5e91506256399e2c3d31fa82f424f2ad4ae9839ea4608ee74e4213027fb6095c22240f30e53e3f7
-
SSDEEP
24576:FTJz2MBrzuxR6OwLnlJ2Vk/wq9D9gj99QF1iAzefNBlcpFU:FTvzQhelJsk/wSKjTMPkfp
Static task
static1
Behavioral task
behavioral1
Sample
M0000B Requisition form.pdf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
M0000B Requisition form.pdf.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
ozenmobilya.com - Port:
587 - Username:
[email protected] - Password:
ozennefes - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
ozenmobilya.com - Port:
587 - Username:
[email protected] - Password:
ozennefes
Targets
-
-
Target
M0000B Requisition form.pdf.exe
-
Size
2.8MB
-
MD5
01d0fd052f583ddee7c23860d437fa0e
-
SHA1
0c027385b3a87cb2d2ae63a199e00ee468623d8e
-
SHA256
117864e2e63bdafe3be560806bcc49c7701e524d173d867e0069cc2cc591692b
-
SHA512
452279616d17d9ac430ca98607cc15cc65f4b8489dc4f4d4eb160f76afacf230602cb6c14fee6915b5aca5363b24564403c67b10df8b5788a9f16b2213dff2ed
-
SSDEEP
49152:SgpOmgDQ06m3N051GXdJCXw5Y9ehawM1A8mfwosQWN1:MDDe4RhEHFD
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-