General
-
Target
29112024_0556_28112024_DATASHEET.pdf.iso
-
Size
874KB
-
Sample
241129-gm684svmbk
-
MD5
e594513187cd25454fc8794982bf44fc
-
SHA1
f2d3c036ef5219a052262b6b83252eb1bcc46080
-
SHA256
4b03d49072fda90224ebe6dda7c4e1f56c1b03385663f37d69fcb517ea260aea
-
SHA512
f128a84c317da0916ea9a2935023b85117660c568b78ba280ec69b199fd67eb9cd7cb07775e7c134f5e5bf2119cfd97b4a732d8d3a1814de67d26ce4abe66dd6
-
SSDEEP
24576:wl1zGUxjsHnpd/nLkB0c0NmrjZU/+LKypMJJd:wPLiz/LFd0UmLdpMJJ
Static task
static1
Behavioral task
behavioral1
Sample
DATASHEET.pdf.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
graceofgod@amen - Email To:
[email protected]
Targets
-
-
Target
DATASHEET.pdf.exe
-
Size
812KB
-
MD5
ca87fec7058336ee181a72b358fe73eb
-
SHA1
b60594db58b85f139fe81c09e66157f4589143e0
-
SHA256
42c1b181d44bcf77ae24d90ded8dc3a319a1646e5d7e93fc6cfc4d25ae685f83
-
SHA512
b4c2cf61cfea57fccacaa540d070f8cd62e61b66380615fd8ffebbea92fa03f94f09a0ddb7f58f8e821c08b2416726d8df005445324498a35461168b5f51bd55
-
SSDEEP
24576:tl1zGUxjsHnpd/nLkB0c0NmrjZU/+LKypMJJd:tPLiz/LFd0UmLdpMJJ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-