General
-
Target
c69e2f1e27fd31c0d1433e92b749fafe68e642b830611e4ed87f740bfb080f4c
-
Size
560KB
-
Sample
241213-bkyajavrbl
-
MD5
18070d2b4f275b1465e291f31f8b6b02
-
SHA1
090b69a4e1abf50e1e8fe8a2d9617bbb0dab789c
-
SHA256
c69e2f1e27fd31c0d1433e92b749fafe68e642b830611e4ed87f740bfb080f4c
-
SHA512
29154198303dfd8f96cce40c5cbe1a51ab3d86f89d03bff324e9ec524efefa37c4aaab686f7fec8a34f9b3360008183df237aa05a70fc6f64868757170de65e2
-
SSDEEP
12288:76pok0WiCsaMuz7FsEgVL1ayEPFTqGSFXW69c577j+AAIW:Np/CsgsvN8SPG7er
Static task
static1
Behavioral task
behavioral1
Sample
PO4100688444 PDF.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.santonswitchgears.com - Port:
587 - Username:
[email protected] - Password:
cJPF@$I3 - Email To:
[email protected]
Targets
-
-
Target
PO4100688444 PDF.exe
-
Size
1.0MB
-
MD5
42095854acb2c20729e1afe08fa4fcad
-
SHA1
823ebdbdd6e8f8c567ce7a19a89fbb9dcd7b1446
-
SHA256
745104528d7478543fa629ff40dad531dd09fc4e95de5ed97c94893e90fd2c77
-
SHA512
9a4a045d5eab89338fbf0e8305af7975c8c2d2defe53dff8c236520397818e1111be36066c70866fa1bfb5f1439698c254b83fa88eff4ec0c4b8ab25eefbbfe7
-
SSDEEP
24576:au6J33O0c+JY5UZ+XC0kGso6Fag9z8vf2BpIWY:su0c++OCvkGs9FagR8vfEhY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-