General
-
Target
Shipping Documents.xlsx
-
Size
296KB
-
Sample
211025-g6n7msffg3
-
MD5
ae884ec9f42ceb1dcdef6cf4f93cce9c
-
SHA1
6226ec516e17485b6b0e199e1a7661f56c4903c2
-
SHA256
997ce8372e3dca365258dd1643f2de015d105205cae9b83a49507dc0281fb48e
-
SHA512
08e27d46d0ae20a832b7a8a4a49c1179d4affeadbd32bb438854ddefa3800c531a6a2580477e9bc400e0f5477b551ffbdb8d15028fccd94a2016290f1e20090d
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents.xlsx
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Shipping Documents.xlsx
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.enerzi.co - Port:
587 - Username:
[email protected] - Password:
Enerzis@123!#
Targets
-
-
Target
Shipping Documents.xlsx
-
Size
296KB
-
MD5
ae884ec9f42ceb1dcdef6cf4f93cce9c
-
SHA1
6226ec516e17485b6b0e199e1a7661f56c4903c2
-
SHA256
997ce8372e3dca365258dd1643f2de015d105205cae9b83a49507dc0281fb48e
-
SHA512
08e27d46d0ae20a832b7a8a4a49c1179d4affeadbd32bb438854ddefa3800c531a6a2580477e9bc400e0f5477b551ffbdb8d15028fccd94a2016290f1e20090d
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-