General
-
Target
HOUSELIN SPEC_RFQ10040.xlsx
-
Size
1.4MB
-
Sample
211018-jyd3taebam
-
MD5
4258f07e6d70c23ba0ef6ee85b0eab40
-
SHA1
e02525db8972aad2fdd692e36fcedb5e2170f00d
-
SHA256
73b7e811ea2cc73661d157f4dc28646a584f63b1614f595a390d99cde4463a74
-
SHA512
20ef319ed7156e7c09bc47f72eb97b6f74ef7c7c73c4324ee9b5fe64505bad19ea7f674ccc0951c3ad2bf6ad7f618378da4bb43a892e0cf5ddcd29da1c62f73a
Static task
static1
Behavioral task
behavioral1
Sample
HOUSELIN SPEC_RFQ10040.xlsx
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
HOUSELIN SPEC_RFQ10040.xlsx
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.abaamap.com.mx - Port:
587 - Username:
[email protected] - Password:
6.9)bx6}m*k}
Targets
-
-
Target
HOUSELIN SPEC_RFQ10040.xlsx
-
Size
1.4MB
-
MD5
4258f07e6d70c23ba0ef6ee85b0eab40
-
SHA1
e02525db8972aad2fdd692e36fcedb5e2170f00d
-
SHA256
73b7e811ea2cc73661d157f4dc28646a584f63b1614f595a390d99cde4463a74
-
SHA512
20ef319ed7156e7c09bc47f72eb97b6f74ef7c7c73c4324ee9b5fe64505bad19ea7f674ccc0951c3ad2bf6ad7f618378da4bb43a892e0cf5ddcd29da1c62f73a
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
AgentTesla Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-