General
-
Target
sample04052021.xlsx
-
Size
1.0MB
-
Sample
210504-d6mwybsl5e
-
MD5
ad7c902b259476d340eb66125aa4846c
-
SHA1
96b5a7b3dbc729d794d9ff1af2701dfc8a82ee24
-
SHA256
febdbb2078e5f14e3f534dac4dcf387097c8168f8e803ff98f642b9a99517865
-
SHA512
0144c0eb50014037eb177c1b4e93dae3183b41884db8f7f63a76ee9852f1ba23c4ab663144ea39cea6345a02a2cdc6244688553b0a95570ebb2a354f9261be17
Static task
static1
Behavioral task
behavioral1
Sample
sample04052021.xlsx
Resource
win7v20210410
Behavioral task
behavioral2
Sample
sample04052021.xlsx
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rodcointl.com - Port:
587 - Username:
rodco@rodcointl.com - Password:
rodco110449a
Targets
-
-
Target
sample04052021.xlsx
-
Size
1.0MB
-
MD5
ad7c902b259476d340eb66125aa4846c
-
SHA1
96b5a7b3dbc729d794d9ff1af2701dfc8a82ee24
-
SHA256
febdbb2078e5f14e3f534dac4dcf387097c8168f8e803ff98f642b9a99517865
-
SHA512
0144c0eb50014037eb177c1b4e93dae3183b41884db8f7f63a76ee9852f1ba23c4ab663144ea39cea6345a02a2cdc6244688553b0a95570ebb2a354f9261be17
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-