General
-
Target
4b6cc2a292238a5ed644954ab8360dc523244319788a9f4c3b15fd1d2ba493e5
-
Size
1.1MB
-
Sample
250114-cjdp6swlej
-
MD5
7d1502a1c9f0244d8ab6a76a08a4b58d
-
SHA1
9c0c1397f58a2ce95cf96e93047357bd068a4f03
-
SHA256
4b6cc2a292238a5ed644954ab8360dc523244319788a9f4c3b15fd1d2ba493e5
-
SHA512
79cde5bc4b6234a0423893295877745960bd57c31644dee3812ca03c36e266ebfdb9dd81737112ce3033b71b7269ef671e169090a624a1d14f242de0cef68477
-
SSDEEP
24576:qg/+oQJZiWsdKdN6d/xkeJjmjDbssIBtyg/8Kk:WTedKOd/jeDQtyP
Static task
static1
Behavioral task
behavioral1
Sample
F25-Try on pdf.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Targets
-
-
Target
F25-Try on pdf.exe
-
Size
1.3MB
-
MD5
6df84e1338b2efb7200ff1a7539b9290
-
SHA1
8aa472897a6359e137f4ac7b39191d10aa33315b
-
SHA256
71b9fb3f5b06fc5f1a1e50b744c376c6048452f6f8fa246a96b1d8626fc8133d
-
SHA512
4c13b99126f11f68af1960c7ae71a6f8833b0f56e2dc32033f6bc7116cdc52f4ba50a97947768ab381103752211eb6bed9bb5afc22b8ac1116a03b0b3558c85b
-
SSDEEP
24576:LdlRLWN2O4KCo48p7zB+LiGZl3YUoHY/gxJIpv6YVqpb+xc3q1vDl4y1qy:LzRL02O1CZ85zB+pPYt4/tS8xx4/y
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-