General
-
Target
fc3a02467e56a002d3749c1a51a40247dfbfdf2e4528f3ffb807bfc5460350ec
-
Size
766KB
-
Sample
241123-cffqcsvpa1
-
MD5
f4d6612a6b5cb4631d20b408045d4225
-
SHA1
fd6f304e36c91db96529a45441d54f49f51861ae
-
SHA256
fc3a02467e56a002d3749c1a51a40247dfbfdf2e4528f3ffb807bfc5460350ec
-
SHA512
8ecb7eaab7ab64e8c6df825b091fb854720941037eed082e7f604562dedf0e10a10d8d89c1ee52fa2c5013403df16ae085c6b64559cd22a1b368cd1a965e708b
-
SSDEEP
12288:4OMK4A9bEyD9Qw5+Wg+aFqF8F7sqtzm17+Qx6KOd0zwtI9p6bNjEW:TMKEyZtQN4yTzo7+u6da79YdE
Static task
static1
Behavioral task
behavioral1
Sample
DATASHEET.pdf.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
graceofgod@amen - Email To:
[email protected]
Targets
-
-
Target
DATASHEET.pdf.exe
-
Size
706KB
-
MD5
fe363e3c97ba9206b611873fb91a0793
-
SHA1
f8559afa8d8ae545327484693a8b11fee4cb6142
-
SHA256
7f72c9f1ea3533cb8ae08c3bb3da362cb2b97eff3b6b30ad3c05f74fffbe2071
-
SHA512
35ea1b34f82aff941e6b968642c81bab49aeecefce9b28728f67b2ebf1853ac73dced4b8b17f01610477964081ea4ac5967df7d9237618753fa3dded41d785a4
-
SSDEEP
12288:BOMK4A9bEyD9Qw5+Wg+aFqF8F7sqtzm17+Qx6KOd0zwtI9p6bNjEW:kMKEyZtQN4yTzo7+u6da79YdE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-