Overview
overview
10Static
static
303.10.2024...B).msg
windows7-x64
503.10.2024...B).msg
windows10-2004-x64
3unnamedtrd.png
windows7-x64
3unnamedtrd.png
windows10-2004-x64
3Ödeme kop...df.rar
windows7-x64
3Ödeme kop...df.rar
windows10-2004-x64
3Ödeme kop...df.exe
windows7-x64
3Ödeme kop...df.exe
windows10-2004-x64
10General
-
Target
03.10.2024 Tarihli Ödemeye İlişkin Dekontlar (490 KB).msg
-
Size
506KB
-
Sample
241008-m2dg8stekm
-
MD5
81c157483390c754351aee9ff6274500
-
SHA1
3b075c71de679ae362060320d9da1db1db8ed56a
-
SHA256
52f4e93c52a70db0d77c0fa2c3468aab038f3ca684cabece333b7497d3cf773a
-
SHA512
4d3e8ca8a8f5df1a601f12b526ff72cb633d098cc33d8cb0c105788bd36e50b1e1746590085e4534a4b50558bc70f21a9e10cdc0d237ca23e7a4aeb4bca7bfd4
-
SSDEEP
12288:1zzoNlFNIMvUB4q1Suw9NdELCpXMPbHjfGGn:9oN7N+H1tegbPPfGGn
Static task
static1
Behavioral task
behavioral1
Sample
03.10.2024 Tarihli Ödemeye İlişkin Dekontlar (490 KB).msg
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03.10.2024 Tarihli Ödemeye İlişkin Dekontlar (490 KB).msg
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
unnamedtrd.png
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
unnamedtrd.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Ödeme kopyası.pdf.rar
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Ödeme kopyası.pdf.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Ödeme kopyası.pdf.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Ödeme kopyası.pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7162202130:AAHTxdkbyFCUMWCzyf9jutDYYrL6rqEAva4/
Targets
-
-
Target
03.10.2024 Tarihli Ödemeye İlişkin Dekontlar (490 KB).msg
-
Size
506KB
-
MD5
81c157483390c754351aee9ff6274500
-
SHA1
3b075c71de679ae362060320d9da1db1db8ed56a
-
SHA256
52f4e93c52a70db0d77c0fa2c3468aab038f3ca684cabece333b7497d3cf773a
-
SHA512
4d3e8ca8a8f5df1a601f12b526ff72cb633d098cc33d8cb0c105788bd36e50b1e1746590085e4534a4b50558bc70f21a9e10cdc0d237ca23e7a4aeb4bca7bfd4
-
SSDEEP
12288:1zzoNlFNIMvUB4q1Suw9NdELCpXMPbHjfGGn:9oN7N+H1tegbPPfGGn
Score5/10-
Drops file in System32 directory
-
-
-
Target
unnamedtrd.png
-
Size
19KB
-
MD5
2cf348de66d8ca24abdd77a858807970
-
SHA1
5bf0680377839f02a10afabcf6d5ed3e15e77269
-
SHA256
38712bb168f25f9ccdf9eb3cbf9b434394c1e35b61f77b2bd623d4b8d2cb1a9c
-
SHA512
7718050f871ee179d04e27dbe607b2835229c8271f2827cb524cb7fa7b942477a26efd19fde661a9f69fa443cada975f952e84fd405ad897f27187406d416f0c
-
SSDEEP
384:Il6wA85gtBDlq+nk6YPOTbr54WpjoJ+R6kg34s9dh+0Ltmvtk:IgwA85gtBDlqck6nrCW6wZg3LAUtmFk
Score3/10 -
-
-
Target
Ödeme kopyası.pdf.lzh
-
Size
449KB
-
MD5
1a45c595585575d4449d876545ea00d4
-
SHA1
a3377beb563e75b32b730e353b825972ec593086
-
SHA256
db84ecf28cf9c25af8f91b5e442b61ad9499cebb0327fd9b9c7a015c5c15b9e9
-
SHA512
471a19e46e06e3e7b69af94dab44ff8a0420ec953cf83aca48cdb050c4af1e37cfcdf64fc6720880a56a69bc6b84a16081df9a7e790b480863f0b4178d79d045
-
SSDEEP
12288:YoNlFNIMvUB4q1Suw9NdELCpXMPbHjfGGnU:YoN7N+H1tegbPPfGGnU
Score3/10 -
-
-
Target
Ödeme kopyası.pdf.exe
-
Size
1.4MB
-
MD5
cb9df2754f620ea0739b3dd1e3e3422f
-
SHA1
579286334ac2305fe6fd5419e7b046d96e463033
-
SHA256
e6b72ddd31a53809013959c4d33297e28d76c73dfa9fad878f8bd64d69bae0b2
-
SHA512
9b70944f5327c06286e4231be84c7259dd92dcfc528bb8b31eb23587adba0d7ce67e6435f93ca7c39f6093f3f26e98288ef1c3cc80608ef5873acf433cceb9de
-
SSDEEP
24576:j1eTYAK4egHCAjifn/Na5OMiEX6/QgcixPMRNglNq7:5e/K4IAgcix4NgTq7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-