General
-
Target
1.ppt
-
Size
78KB
-
Sample
210422-x6y4jdcvkn
-
MD5
d942cc1f6472ee2ef8c9dc5543e009ab
-
SHA1
b322a2b14f015afa34e632e7f08149444eb3857e
-
SHA256
6fe9b24604c251a382a9f9148b26b08795cc09784f552bdc9d764f90390ac0d7
-
SHA512
164c3885d3f3eb05d5cf0b5053971d8f7f1ed891978df7b6231d3b8b29208eb657224eb34ed8534b61fd831bef193febb6e7bd0522189fa4127e8fdd363cc42c
Static task
static1
Behavioral task
behavioral1
Sample
1.ppt
Resource
win7v20210410
Behavioral task
behavioral2
Sample
1.ppt
Resource
win10v20210408
Malware Config
Extracted
agenttesla
http://103.133.105.179/1717/inc/b0201c21c4adb5.php
Targets
-
-
Target
1.ppt
-
Size
78KB
-
MD5
d942cc1f6472ee2ef8c9dc5543e009ab
-
SHA1
b322a2b14f015afa34e632e7f08149444eb3857e
-
SHA256
6fe9b24604c251a382a9f9148b26b08795cc09784f552bdc9d764f90390ac0d7
-
SHA512
164c3885d3f3eb05d5cf0b5053971d8f7f1ed891978df7b6231d3b8b29208eb657224eb34ed8534b61fd831bef193febb6e7bd0522189fa4127e8fdd363cc42c
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
AgentTesla Payload
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-