General
-
Target
e17380b6843421f15eb76b717c3b16bc092941d1d95914c88e9d1635c4d5eb90
-
Size
638KB
-
Sample
250107-bd52ssymhr
-
MD5
7feccbd41399929021dc8bd0f8e80ce6
-
SHA1
1439c24d5be04ac690d82d5f54ac211022a85627
-
SHA256
e17380b6843421f15eb76b717c3b16bc092941d1d95914c88e9d1635c4d5eb90
-
SHA512
3925bf77024728323f070f8075de77790cf6c0693709c68acc9d5c68dcd1c16383c9c2eb3158aa633050da6caf4fcc09b25f3f27912644f89ac822173b17a696
-
SSDEEP
12288:4O4vqUDgHwLTfeBE/25kG5n2t88Lxi7XWnrhUe8tq/jMlwzFZRN4OJzYMUDd6:/UkHGfeu2F5+88yX4UoLMuzF6OJN8d6
Static task
static1
Behavioral task
behavioral1
Sample
revised New order pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
revised New order pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5332853472:AAHdywgWGa_Sq-P5gn5a5U2a1mM20putFi4/
Targets
-
-
Target
revised New order pdf.exe
-
Size
811KB
-
MD5
e96ded9d27ec1a49f1c8cb0035ab088b
-
SHA1
5b7e63a762eb0da3c36bacf9076b42db9cd49a8b
-
SHA256
4583e8bd3dc0aae3312813a57cd4a2ab4c1545a3855ce0b4d6e4914a07217569
-
SHA512
d67917bb819697850ff510cb17e81aff970b9b5a93ed048982b2b37869779532fda9862bbe488e1b13a0edb30ad6cbd62eafc6eb4672c20b7f1209a20eeae5bd
-
SSDEEP
12288:YgsDoOIlCJ3yXSl9rbOVaU/VQi+gC3OtsJAS8HnLrAss9DWdMxGkR:JfE8SlhbSQi8p8HnwsyqMxd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1