General
-
Target
BratneyCompaniesPO-5313SCXC-097.xlsm
-
Size
139KB
-
Sample
200716-s5mxdbdjgn
-
MD5
49a24e9873f40ce4424c9f324660874f
-
SHA1
c833cc3c580e565ab3e831fba24351c5e5d59293
-
SHA256
b498465b42c81550c8e6e6afe13029fe4a552d54b2134425d6b521a4190eb9ab
-
SHA512
b339439dd4e2fc21b5b401a673d6caed20fb504b49a81cd0697453ddd7e76f0f400f91f29459cfead07e087922cbf65686a6745320baf5b0faf9314c22bab0fb
Static task
static1
Behavioral task
behavioral1
Sample
BratneyCompaniesPO-5313SCXC-097.xlsm
Resource
win7
Behavioral task
behavioral2
Sample
BratneyCompaniesPO-5313SCXC-097.xlsm
Resource
win10
Malware Config
Extracted
http://hsdowsggpla.com/ThurEvent.exe
Targets
-
-
Target
BratneyCompaniesPO-5313SCXC-097.xlsm
-
Size
139KB
-
MD5
49a24e9873f40ce4424c9f324660874f
-
SHA1
c833cc3c580e565ab3e831fba24351c5e5d59293
-
SHA256
b498465b42c81550c8e6e6afe13029fe4a552d54b2134425d6b521a4190eb9ab
-
SHA512
b339439dd4e2fc21b5b401a673d6caed20fb504b49a81cd0697453ddd7e76f0f400f91f29459cfead07e087922cbf65686a6745320baf5b0faf9314c22bab0fb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blacklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-