General
-
Target
63bb4741b835837ad2c520f2a2bc9264116851d9eba610793d0da3be6708ba0d
-
Size
1.4MB
-
Sample
250207-bnjasatkc1
-
MD5
686cd1e0d3aafad79a89acf4f14f9895
-
SHA1
af2ee372c2ce5cf57753bfba1eecaf95e8934f75
-
SHA256
63bb4741b835837ad2c520f2a2bc9264116851d9eba610793d0da3be6708ba0d
-
SHA512
e9c6713333b4a59b1e6bfe05996180b78acd4f89c91616d318112b346da433586634dd396b7479f0df08ac01e27b453d9733143840182da545423289f3dbd534
-
SSDEEP
24576:8s2gHyxqaENT7+nxsUx28aYA9s8vAzQ4RDAtDO3cJzCob78naDQeiTXwqswaETIK:PbUWUxk1NokmAtaGwkQbTfswagIdc
Static task
static1
Behavioral task
behavioral1
Sample
Proforma Invoice.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Proforma Invoice.pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5310184325:AAFI3fSQ6VcGu_NSTmv7d-qK2WCVhYY_qfg/sendMessage?chat_id=1293496579
Extracted
agenttesla
https://api.telegram.org/bot5422204482:AAEu-I3AZCMcCehYPkAHAbI6qEwhd1OKxpk/
Targets
-
-
Target
Proforma Invoice.pdf.exe
-
Size
1.5MB
-
MD5
1faddd5b9d93e407e103e3065f1ed07f
-
SHA1
31b14aa6cb25239e8087e07af03178e446a50f97
-
SHA256
034cf32f26c06977510bb01c37167b100e949f88ba0073fd603d3cc909c9e3a3
-
SHA512
b0f419d3b558d49707f89897c426238a60ae02385176e4dd7fb9629c2471c75ca23692334d3e1e2e5ba30674dbb46d657d7acbf7f79a68569a69ed7a38d227b3
-
SSDEEP
24576:5AOcZAZwsp2RE/lPpVDcOOxYp2aGAuvZG31RMaas/xZvihMhi9+zOgQVUWT5:zSsZiipFQA3XM9oUsi9LPT5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blustealer family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1