General
-
Target
C0R567842T257642523.eml
-
Size
1.2MB
-
Sample
241014-hdqqfa1elg
-
MD5
cddd2a140ac0a97c4d97e1cd9961104a
-
SHA1
e5ef5213191032af6db61a7f88c0147327b6b0d1
-
SHA256
54aceb40ff0dae08e2530d3d4bce7cfc94f06aff080c986c3eedc3f7655014ef
-
SHA512
6199136df432952271e289bddaa60d312c0a90ae7a78d18d920353cbab5d27912d5c0140ea1631668947286b3e18e23e567d9bce972158f5d0083d65e3234830
-
SSDEEP
24576:BOLKGKIMWRXwsYf+RdAXeQxXVWU6xvYM5Z05OEXvjT:Q2GaylYheBLu7T
Static task
static1
Behavioral task
behavioral1
Sample
AWB _Ref#5800028900pdf.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
marcellinus360 - Email To:
[email protected]
Targets
-
-
Target
AWB _Ref#5800028900pdf.exe
-
Size
1.1MB
-
MD5
bde744fbe419f73f9b44fc0570c233f4
-
SHA1
f7b987ce8d3e4e1f1bfc7819c70ffefcb158fd2c
-
SHA256
586008861c32e8f32bb841b3734614ca385ba4c554a976ce9074a27d0df5e784
-
SHA512
5fcafd65d155abb11fbc84c10fea30afe190c89ef7b806654887b8594d1c6793b017902a0f479ed03968e4003af71edb2f33df9073406bbdde3519fa1dc75a75
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLnX89AOLbz+kbn/y3B:f3v+7/5QLsO8bSt3B
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-