General
-
Target
08012025_1011_06012025_proforma invoice pdf.zip
-
Size
643KB
-
Sample
250108-l8d7nsvrbw
-
MD5
2daa2272f18623da04771d956f017a06
-
SHA1
ef8469272bac0fb9c8b932548d4d5b36ea1bade9
-
SHA256
4bb3f92934e8d3c04d4c83f49ae0e8f43a1e2e491d508d79e298f960c565513c
-
SHA512
742584fdaddcae19cde3d7a4e10eb3fff2cffb91fcd0ddd048afb1df81310c06212f2460e9bcef48533a441042f7dda00a454b56e547aebff3716e67edbf7d02
-
SSDEEP
12288:BWrGBq6JJy1SllvhojaMlVwE+6i30tsVA4O3bjX06s9dWkjA:WGo6GSlRhEwEoFO3bY6+e
Static task
static1
Behavioral task
behavioral1
Sample
proforma invoice pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
proforma invoice pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5332853472:AAHdywgWGa_Sq-P5gn5a5U2a1mM20putFi4/
Targets
-
-
Target
proforma invoice pdf.exe
-
Size
811KB
-
MD5
e96ded9d27ec1a49f1c8cb0035ab088b
-
SHA1
5b7e63a762eb0da3c36bacf9076b42db9cd49a8b
-
SHA256
4583e8bd3dc0aae3312813a57cd4a2ab4c1545a3855ce0b4d6e4914a07217569
-
SHA512
d67917bb819697850ff510cb17e81aff970b9b5a93ed048982b2b37869779532fda9862bbe488e1b13a0edb30ad6cbd62eafc6eb4672c20b7f1209a20eeae5bd
-
SSDEEP
12288:YgsDoOIlCJ3yXSl9rbOVaU/VQi+gC3OtsJAS8HnLrAss9DWdMxGkR:JfE8SlhbSQi8p8HnwsyqMxd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1