General
-
Target
20062024_0304_19062024_chem-03240.pdf.gz
-
Size
694KB
-
Sample
240620-dk52gszdjj
-
MD5
e55bb4403693e8b9990ebf15921a8b7b
-
SHA1
daf6c98175e8c39327c47a99675620ff92a26268
-
SHA256
50828bc03c789210be4ad053d4c2c58eb68b4ddd6a9716588a345ef8786373d2
-
SHA512
06a3ae1543d22f7ddf146fda0a97aee6f77853cd7fd7bb54aa9664b7ddfbbccbfdf541f578f021faf8542b59309f760d8ec2789aa3f90a00a0d7717e0c71bba9
-
SSDEEP
12288:XiHAGRkkFmUC5obDjWeePzkd9B54QuLx33OBKdW3hCD0B11H0xs51QXb:XiHAMFQCDjWeePYd9B54QuFnOB7wD0O/
Static task
static1
Behavioral task
behavioral1
Sample
chem-03240.pdf.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
proglass.com.sg - Port:
587 - Username:
[email protected] - Password:
NiconPay$ - Email To:
[email protected]
Targets
-
-
Target
chem-03240.pdf.exe
-
Size
975KB
-
MD5
fb037c0e0a26a6399cc3c22f24d819db
-
SHA1
9da8dfc260523640c23d77bd37cc012af7275e09
-
SHA256
c5e436daea517264f270beba101c5d2ae9d9b25a72c8c4ed049239ecddb7fcc8
-
SHA512
a23fc689ca44c46ebc78eaf39dfbe4aac5b366cffe0b43cfbf2214f02a67c19b8a9977b5cf1d5bb1374fca9f335245a7742907f58a152008dbc0de941fd1f62e
-
SSDEEP
24576:hbtQQlz5uaQ9pOXsSdsSSd6MsxpnmhB4nYJ/Z:hbN1EjpOXsksSbfdYL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-