General
-
Target
02102024_0102_01102024_Shipping documents BL, CI & PL.pdf.rar
-
Size
751KB
-
Sample
241002-bd5q2ashpe
-
MD5
380796d512f67990a943b577d6c23419
-
SHA1
64481bccd48226fcc634cf391c3be03c0c53639e
-
SHA256
5b4afa4cfcce54475328d7f8b52bbedf094e14be9d9b06f5a1822e70a5aa2a6d
-
SHA512
9189a3d63bc366e8db82cca610b0ea27d1f8d82eb56f812072d72ddf356269ba3c826c732d06a49437cf3ea53363798e89a71f3f407e8d71a8c4cada00bc2890
-
SSDEEP
12288:gyC6wuynDD3Npmb1FxtqGwoJKdaYwEx1qV+fpppXOuGZVa41hTM7aNiWjL933Ge1:gyCXgrNnJKNqV+fprv41aeL93xQZg
Behavioral task
behavioral1
Sample
Shipping documents BL, CI & PL.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Shipping documents BL, CI & PL.pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.palumalimited.com - Port:
587 - Username:
[email protected] - Password:
85h!UAfvL2AE - Email To:
[email protected]
Targets
-
-
Target
Shipping documents BL, CI & PL.pdf.exe
-
Size
811KB
-
MD5
a66520a932198c68fc0df0423e2c046b
-
SHA1
d49acc9ad7e386a48d83d0bd334294b4168e21fb
-
SHA256
40f9a446728e079ce7f1b7b8cd6a6f2ff82e4fb22d209ae9576f178612d35369
-
SHA512
543ae2fa9923a599d55f0ec74f4eb2dd724209e83a5cb285fe19d40655ed8901c810013c6ba593cf55a7626cc120fdf5815a1eaa9e61ec071b2190f0b4f55f32
-
SSDEEP
24576:qD0tM85tbNJjldeYiYHkOtw0BH2Hmpp68BMQaV6/778:qD0tM85DJjl/iW1tpBFpp6Ha78
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1