General
-
Target
Invoice1000711119.pdf.exe
-
Size
806KB
-
Sample
241001-pkmqpatajc
-
MD5
8a3c0b5a4d9d28bd6965e18cb36d53d2
-
SHA1
35d1333301d0449c9ca7895f20173d7787193d3b
-
SHA256
6fe16b374a594b460bdd5bde3282b2e845b48757650fdce9acc4823d1a4fccc9
-
SHA512
a858d6ed006aebd6aad1b5f53b8998b8f64eab13ac7d476a80fe7a4beb10d71c33d907c6d808f9ff25f50c33606fe6ed32dbce14ab18569d36433f2cd63a51ee
-
SSDEEP
24576:VD0tM85tbNJjldeYiYP2u0hs8Pl/ROxPcXTICiJhg:VD0tM85DJjl/iYas8N/chOEhg
Behavioral task
behavioral1
Sample
Invoice1000711119.pdf.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Invoice1000711119.pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.palumalimited.com - Port:
587 - Username:
[email protected] - Password:
85h!UAfvL2AE - Email To:
[email protected]
Targets
-
-
Target
Invoice1000711119.pdf.exe
-
Size
806KB
-
MD5
8a3c0b5a4d9d28bd6965e18cb36d53d2
-
SHA1
35d1333301d0449c9ca7895f20173d7787193d3b
-
SHA256
6fe16b374a594b460bdd5bde3282b2e845b48757650fdce9acc4823d1a4fccc9
-
SHA512
a858d6ed006aebd6aad1b5f53b8998b8f64eab13ac7d476a80fe7a4beb10d71c33d907c6d808f9ff25f50c33606fe6ed32dbce14ab18569d36433f2cd63a51ee
-
SSDEEP
24576:VD0tM85tbNJjldeYiYP2u0hs8Pl/ROxPcXTICiJhg:VD0tM85DJjl/iYas8N/chOEhg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-