General
-
Target
REVISED PI.PDF.exe
-
Size
1.1MB
-
Sample
240829-nb12aazgml
-
MD5
9d114b87c9231cccb3d174cc263cea07
-
SHA1
8cd162a3b2e7e47a5e5e3e94ad69da17d838bd54
-
SHA256
cd0ad4d29a0d644a39002797c2942a4ea94cdbffbf0e8eeff45649b2875a53fd
-
SHA512
d2303d156a9c8d44c4435b0053884441cf44422fa9f9f5efb7316a5c44acf5b3f882107dd9721c003bf69a00f4a65b8f3933df59875dec8f7c52875d2500841c
-
SSDEEP
24576:KqDEvCTbMWu7rQYlBQcBiT6rprG8aTlJQQOtf88ng:KTvC/MTQYxsWR7aTYQqU
Static task
static1
Behavioral task
behavioral1
Sample
REVISED PI.PDF.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
REVISED PI.PDF.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.fosna.net - Port:
21 - Username:
[email protected] - Password:
(=8fPSH$KO_!
Targets
-
-
Target
REVISED PI.PDF.exe
-
Size
1.1MB
-
MD5
9d114b87c9231cccb3d174cc263cea07
-
SHA1
8cd162a3b2e7e47a5e5e3e94ad69da17d838bd54
-
SHA256
cd0ad4d29a0d644a39002797c2942a4ea94cdbffbf0e8eeff45649b2875a53fd
-
SHA512
d2303d156a9c8d44c4435b0053884441cf44422fa9f9f5efb7316a5c44acf5b3f882107dd9721c003bf69a00f4a65b8f3933df59875dec8f7c52875d2500841c
-
SSDEEP
24576:KqDEvCTbMWu7rQYlBQcBiT6rprG8aTlJQQOtf88ng:KTvC/MTQYxsWR7aTYQqU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-