General
-
Target
RFQ__PO_PO 24090041-PDF____PDF.exe
-
Size
1.5MB
-
Sample
241004-eym89stgnr
-
MD5
bfea25f0cbf64304aaa2c361805d5e51
-
SHA1
700796263c71c76607cbbd74678b0b084d7bdb7c
-
SHA256
0870d9107c380e8a94587e7924b1230d146ea21c6bbc7b9731bff408204ab8d0
-
SHA512
88a62bc3b24b5fa43fa7a3bfe5075c50e36ae84a526b4fc34607cbfd9b525d8dd6baa4db4cfdd396e7e6355e3ede35744ae0e4cf6635b8cea780a8bdf63f6260
-
SSDEEP
24576:5qB+ONv0iCIg2p02MKcGXqExSApwS3bFnI/3:5e+ON8iCIHx0k
Static task
static1
Behavioral task
behavioral1
Sample
RFQ__PO_PO 24090041-PDF____PDF.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ__PO_PO 24090041-PDF____PDF.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7162202130:AAHTxdkbyFCUMWCzyf9jutDYYrL6rqEAva4/
Targets
-
-
Target
RFQ__PO_PO 24090041-PDF____PDF.exe
-
Size
1.5MB
-
MD5
bfea25f0cbf64304aaa2c361805d5e51
-
SHA1
700796263c71c76607cbbd74678b0b084d7bdb7c
-
SHA256
0870d9107c380e8a94587e7924b1230d146ea21c6bbc7b9731bff408204ab8d0
-
SHA512
88a62bc3b24b5fa43fa7a3bfe5075c50e36ae84a526b4fc34607cbfd9b525d8dd6baa4db4cfdd396e7e6355e3ede35744ae0e4cf6635b8cea780a8bdf63f6260
-
SSDEEP
24576:5qB+ONv0iCIg2p02MKcGXqExSApwS3bFnI/3:5e+ON8iCIHx0k
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-