General
-
Target
PO-2023-097044.pdf.exe
-
Size
1.3MB
-
Sample
250122-klwyjaxpgv
-
MD5
ad85d887de0b597ca84db1a44263d758
-
SHA1
9f449309a356c5f25beee9be015833d46bb6e7d8
-
SHA256
e6df8c3ab7be7b103ed1ababb36e345817422b173dd25e22199b2f39885f0b42
-
SHA512
d0d46b824161b0ff6dadbf42dde59d9daf6c3dce691d97798d046967fcfb9d8bdbe6cd7aa9a5202dbfca8203bd80b47398827a7ec84bcec2e958b41cd3458592
-
SSDEEP
24576:Ktb20pkaCqT5TBWgNQ7aPjpUeVVdCjSHOwxWjbneTM0lZ6A:3Vg5tQ7aPjpUH5wxWjbew0H5
Static task
static1
Behavioral task
behavioral1
Sample
PO-2023-097044.pdf.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://backup.smartape.ru - Port:
21 - Username:
user894492 - Password:
w6NZOdcSkH1a
Targets
-
-
Target
PO-2023-097044.pdf.exe
-
Size
1.3MB
-
MD5
ad85d887de0b597ca84db1a44263d758
-
SHA1
9f449309a356c5f25beee9be015833d46bb6e7d8
-
SHA256
e6df8c3ab7be7b103ed1ababb36e345817422b173dd25e22199b2f39885f0b42
-
SHA512
d0d46b824161b0ff6dadbf42dde59d9daf6c3dce691d97798d046967fcfb9d8bdbe6cd7aa9a5202dbfca8203bd80b47398827a7ec84bcec2e958b41cd3458592
-
SSDEEP
24576:Ktb20pkaCqT5TBWgNQ7aPjpUeVVdCjSHOwxWjbneTM0lZ6A:3Vg5tQ7aPjpUH5wxWjbew0H5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-