General
-
Target
KT-704-3403.xls
-
Size
35KB
-
Sample
211025-2svsgshefr
-
MD5
231cec4f63028cdcdac30caa196d45b0
-
SHA1
40e0a297b92c7ed3451f0e2aec37edb06018bf55
-
SHA256
d685747fcfcdf80f50b8611fa8f6d992a0d702330a117cb137d8cce80594e696
-
SHA512
498336bb5ff0c6465110e1286e787a1828697d4b34a9a1747ddb5f92b674297f8e7c803756030150f3b31410048137f2c98036b3d3b83d7d5765d7b537130f12
Static task
static1
Behavioral task
behavioral1
Sample
KT-704-3403.xls
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
KT-704-3403.xls
Resource
win10-en-20211014
Malware Config
Targets
-
-
Target
KT-704-3403.xls
-
Size
35KB
-
MD5
231cec4f63028cdcdac30caa196d45b0
-
SHA1
40e0a297b92c7ed3451f0e2aec37edb06018bf55
-
SHA256
d685747fcfcdf80f50b8611fa8f6d992a0d702330a117cb137d8cce80594e696
-
SHA512
498336bb5ff0c6465110e1286e787a1828697d4b34a9a1747ddb5f92b674297f8e7c803756030150f3b31410048137f2c98036b3d3b83d7d5765d7b537130f12
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
AgentTesla Payload
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-