General
-
Target
Payment Invoice-163899 (002).ppt
-
Size
100KB
-
Sample
210304-q6g4tdeqnj
-
MD5
595549eb6898057e12f3b800988f2c46
-
SHA1
bac3ffefcad06e5cec547c2a52e3565bd8f50fde
-
SHA256
7989a5d2e9755d1151264362dd6588dd61c6af6840e30dc3b897f9b6e4a06b40
-
SHA512
f9e270efcbdd6ec307035fd7788e67d7f5e9a03e75241eedac49116d379228689eec4802eabb110c0b8e737ea7900ff7521db2650cc9e1c2c267eb499104e2dd
Static task
static1
Behavioral task
behavioral1
Sample
Payment Invoice-163899 (002).ppt
Resource
win10v20201028
Malware Config
Extracted
agenttesla
http://103.133.105.179/2929/inc/19fbedc08a8a12.php
Targets
-
-
Target
Payment Invoice-163899 (002).ppt
-
Size
100KB
-
MD5
595549eb6898057e12f3b800988f2c46
-
SHA1
bac3ffefcad06e5cec547c2a52e3565bd8f50fde
-
SHA256
7989a5d2e9755d1151264362dd6588dd61c6af6840e30dc3b897f9b6e4a06b40
-
SHA512
f9e270efcbdd6ec307035fd7788e67d7f5e9a03e75241eedac49116d379228689eec4802eabb110c0b8e737ea7900ff7521db2650cc9e1c2c267eb499104e2dd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
AgentTesla Payload
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-