General
-
Target
Halkbank,pdf.exe
-
Size
639KB
-
Sample
241015-hzyceavhjm
-
MD5
d91288a26f3bba21b1b1a0370ad76e53
-
SHA1
4732007644e147cd49b9f04256be558859be3fba
-
SHA256
3b233c5cc8b85a8020975ed736b93644fdae180f1d6f5190d91a3512e813ba8a
-
SHA512
fe5e95d982e5b73c29010e97652b6bcc435b90a73659099519ab1d112354416ca9d32bded3ddc475bbb002ecd4e31372bb2388d224e71efe889ca7a599e62f89
-
SSDEEP
12288:Pcir1S2IoOAc6/5rZGmy4c/uZno/+gwbFYgcPGcJUOO7aSMf5AzKcWBBcKN2O0CK:6/u9o2LFYZnO5qnbkKKk0
Static task
static1
Behavioral task
behavioral1
Sample
Halkbank,pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Halkbank,pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5834796283:AAGrwY-Kkn2VgcNc7OCI3d_ssicyDA9JZcg/
Targets
-
-
Target
Halkbank,pdf.exe
-
Size
639KB
-
MD5
d91288a26f3bba21b1b1a0370ad76e53
-
SHA1
4732007644e147cd49b9f04256be558859be3fba
-
SHA256
3b233c5cc8b85a8020975ed736b93644fdae180f1d6f5190d91a3512e813ba8a
-
SHA512
fe5e95d982e5b73c29010e97652b6bcc435b90a73659099519ab1d112354416ca9d32bded3ddc475bbb002ecd4e31372bb2388d224e71efe889ca7a599e62f89
-
SSDEEP
12288:Pcir1S2IoOAc6/5rZGmy4c/uZno/+gwbFYgcPGcJUOO7aSMf5AzKcWBBcKN2O0CK:6/u9o2LFYZnO5qnbkKKk0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1