General
-
Target
____861754.exe
-
Size
592KB
-
Sample
240909-klpjfsscrc
-
MD5
7d88ef0cbdc1ea33138d9acf333ac876
-
SHA1
a5554bc3bd0f6d5d2f47e4d84d9ac3bdec08aa7d
-
SHA256
125658d2a15c25d986039b7fd0ac63b8f83b6c7a312b9d1945f251c4a00d1edb
-
SHA512
74db3478e5cc54a7b4de9c897896266e45ce82229bb1eec7a25dd8b17a7084537290def650e8f358dbf90619e6b613726a07bd37c631868795750b2b260dbb26
-
SSDEEP
12288:kCxDHXQiGBHw0OB6SDu3KxsNZyVvwWTSrWYXD7k807vDKR4q:5dA7BQ0INIKWqNTkXk80/Kj
Static task
static1
Behavioral task
behavioral1
Sample
DBG1435766.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DBG1435766.pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.alitextile.com - Port:
587 - Username:
[email protected] - Password:
Myname@321 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.alitextile.com - Port:
587 - Username:
[email protected] - Password:
Myname@321
Targets
-
-
Target
DBG1435766.pdf.exe
-
Size
642KB
-
MD5
c96b1ab041b5de0d12add2c508811d2e
-
SHA1
6312de7b19a06e5c4841c6ec610e9d3479d49ae5
-
SHA256
58e4540c1c53bc7bdcaa26de63fdff31ac8b6db3746c11aa20d0267e8bf83108
-
SHA512
5b9f29070170b6602205a2597c008db85d04dc3b3767fd78f40aaac19e5a733fb635c19304b94b031477783c6366b9b232907816c6bcc3febc712a274c0c4ee9
-
SSDEEP
12288:P/YoBqcgsIg8CmihkBOmYBmhud+/S9qDXrVMz0MKF7IYXQTCsVx3K9i72l:4onJh4ZhR7VMYb7IBVUkE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-