General
-
Target
14102024_1646_13102024_AWB _Ref#5800028900pdf.gz
-
Size
791KB
-
Sample
241014-vaevzsvfmg
-
MD5
fef7ade67cf3a2003cbda1ccb1ee61ee
-
SHA1
42b99e0cb0c5da3bdd0fd72e7297977f8668d3c8
-
SHA256
2f19734e2830cc758cbdb51029bef396a0428b26c85128bc56376262f549ad0b
-
SHA512
9026be514f34884f142b7c62037dc99e77331165a61f1cac126050b4d8be17ac7f50ab37a992930abafd58be5472383c571018bf848a7d3d860bac00a41f8883
-
SSDEEP
12288:lx5nkLeffJWHQb3/LUYAkNTBuBZRMPBJNm9Crf8OLbm4ae6cFwIAQHdzh/yhBvv:lxC6JWwL5TWrMLNiCL8OLbZaOFXRyfn
Static task
static1
Behavioral task
behavioral1
Sample
AWB _Ref#5800028900pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AWB _Ref#5800028900pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
marcellinus360 - Email To:
[email protected]
Targets
-
-
Target
AWB _Ref#5800028900pdf.exe
-
Size
1.1MB
-
MD5
bde744fbe419f73f9b44fc0570c233f4
-
SHA1
f7b987ce8d3e4e1f1bfc7819c70ffefcb158fd2c
-
SHA256
586008861c32e8f32bb841b3734614ca385ba4c554a976ce9074a27d0df5e784
-
SHA512
5fcafd65d155abb11fbc84c10fea30afe190c89ef7b806654887b8594d1c6793b017902a0f479ed03968e4003af71edb2f33df9073406bbdde3519fa1dc75a75
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLnX89AOLbz+kbn/y3B:f3v+7/5QLsO8bSt3B
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-