General
-
Target
08102024_1557_07102024_Ödeme kopyası.pdf.lzh
-
Size
449KB
-
Sample
241008-tdyxlatfpr
-
MD5
1a45c595585575d4449d876545ea00d4
-
SHA1
a3377beb563e75b32b730e353b825972ec593086
-
SHA256
db84ecf28cf9c25af8f91b5e442b61ad9499cebb0327fd9b9c7a015c5c15b9e9
-
SHA512
471a19e46e06e3e7b69af94dab44ff8a0420ec953cf83aca48cdb050c4af1e37cfcdf64fc6720880a56a69bc6b84a16081df9a7e790b480863f0b4178d79d045
-
SSDEEP
12288:YoNlFNIMvUB4q1Suw9NdELCpXMPbHjfGGnU:YoN7N+H1tegbPPfGGnU
Static task
static1
Behavioral task
behavioral1
Sample
Ödeme kopyası.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ödeme kopyası.pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7162202130:AAHTxdkbyFCUMWCzyf9jutDYYrL6rqEAva4/
Targets
-
-
Target
Ödeme kopyası.pdf.exe
-
Size
1.4MB
-
MD5
cb9df2754f620ea0739b3dd1e3e3422f
-
SHA1
579286334ac2305fe6fd5419e7b046d96e463033
-
SHA256
e6b72ddd31a53809013959c4d33297e28d76c73dfa9fad878f8bd64d69bae0b2
-
SHA512
9b70944f5327c06286e4231be84c7259dd92dcfc528bb8b31eb23587adba0d7ce67e6435f93ca7c39f6093f3f26e98288ef1c3cc80608ef5873acf433cceb9de
-
SSDEEP
24576:j1eTYAK4egHCAjifn/Na5OMiEX6/QgcixPMRNglNq7:5e/K4IAgcix4NgTq7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-