General
-
Target
Payment Confirmation.pdf.exe
-
Size
524.5MB
-
Sample
241211-ycgzxawjfw
-
MD5
5e6da30aae7e45fb195792cf3163a67c
-
SHA1
6893308eed3c6019293f77bfec989c4801041614
-
SHA256
e743ab98b51a17d68fa30ca3eb1f62f6622a99cb98711cdd3e01fae4e3bd05a5
-
SHA512
9810ce5ad238621fded5d8d27b669c63b14c22490125285b8ffea6d4671595c0c19629e6f51d0f44eee210e5424f738ae899f6f15b700bc9e4d0a49cdea0a0fb
-
SSDEEP
12288:cVMCwy9EXX+IUeU0U/llUrbLlw+P4T/eWkZesmo6XAWadbj8YL84ZBGk:gwFOI9StlAbLz8/NcKqbj98i
Static task
static1
Behavioral task
behavioral1
Sample
Payment Confirmation.pdf.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7000875199:AAGcJDBHFcfVUBvhBO4xZLw34OXk1NWXSe0/
Targets
-
-
Target
Payment Confirmation.pdf.exe
-
Size
524.5MB
-
MD5
5e6da30aae7e45fb195792cf3163a67c
-
SHA1
6893308eed3c6019293f77bfec989c4801041614
-
SHA256
e743ab98b51a17d68fa30ca3eb1f62f6622a99cb98711cdd3e01fae4e3bd05a5
-
SHA512
9810ce5ad238621fded5d8d27b669c63b14c22490125285b8ffea6d4671595c0c19629e6f51d0f44eee210e5424f738ae899f6f15b700bc9e4d0a49cdea0a0fb
-
SSDEEP
12288:cVMCwy9EXX+IUeU0U/llUrbLlw+P4T/eWkZesmo6XAWadbj8YL84ZBGk:gwFOI9StlAbLz8/NcKqbj98i
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1