General
-
Target
Shipment Documents.xlsx
-
Size
301KB
-
Sample
211019-hs86bsfda7
-
MD5
f4d40b4b78f2056ebcfaf52b52163be1
-
SHA1
5c627e0e50a1211e2557c87358b360720f3a52da
-
SHA256
abb24af23f4bb11299c2e428f36242b872ca4ebe7757500322c2ad0b6bdee43a
-
SHA512
3d1f9e5c39588813d57416ddc24939fc5203d19426689fd1abdb340f3883a812d2845db502ec4cdc845c68b7aee9a5cdf956bcad0c341577fca2da16b4a451cb
Static task
static1
Behavioral task
behavioral1
Sample
Shipment Documents.xlsx
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Shipment Documents.xlsx
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.croatiahunt.com - Port:
587 - Username:
[email protected] - Password:
VilaVrgade852
Targets
-
-
Target
Shipment Documents.xlsx
-
Size
301KB
-
MD5
f4d40b4b78f2056ebcfaf52b52163be1
-
SHA1
5c627e0e50a1211e2557c87358b360720f3a52da
-
SHA256
abb24af23f4bb11299c2e428f36242b872ca4ebe7757500322c2ad0b6bdee43a
-
SHA512
3d1f9e5c39588813d57416ddc24939fc5203d19426689fd1abdb340f3883a812d2845db502ec4cdc845c68b7aee9a5cdf956bcad0c341577fca2da16b4a451cb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-