General
-
Target
Order MGE-PO-2022-027.xla
-
Size
114KB
-
Sample
220927-j478vaeaej
-
MD5
42d05295b18da2d31022f2085f62c1c7
-
SHA1
0e9a4618e0fc737f52300d27f33af614bfbeb7bf
-
SHA256
0755a10bbe45ec010a16f32e842c65be350eed0eb4b0e7cb1e2794986a34abb4
-
SHA512
7c16d8daab58dd5bffa3ef23a1fe9fdb2087b3dbd41afdf20d5e132581787ed4b027bcea2cb8ab3bb2906cde2363021a965e96a5b40a185664783286b6119974
-
SSDEEP
3072:3eGk3hOdsylKlgxopeiBNhZFGzE+cL2kdAVVmF5nNUHukBva5UBmglG:3eGk3hOdsylKlgxopeiBNhZF+E+W2kdp
Behavioral task
behavioral1
Sample
Order MGE-PO-2022-027.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Order MGE-PO-2022-027.xls
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: ftp- Host:
185.216.71.84 - Port:
21 - Username:
blessed - Password:
!!@@##$$%%^^
Targets
-
-
Target
Order MGE-PO-2022-027.xla
-
Size
114KB
-
MD5
42d05295b18da2d31022f2085f62c1c7
-
SHA1
0e9a4618e0fc737f52300d27f33af614bfbeb7bf
-
SHA256
0755a10bbe45ec010a16f32e842c65be350eed0eb4b0e7cb1e2794986a34abb4
-
SHA512
7c16d8daab58dd5bffa3ef23a1fe9fdb2087b3dbd41afdf20d5e132581787ed4b027bcea2cb8ab3bb2906cde2363021a965e96a5b40a185664783286b6119974
-
SSDEEP
3072:3eGk3hOdsylKlgxopeiBNhZFGzE+cL2kdAVVmF5nNUHukBva5UBmglG:3eGk3hOdsylKlgxopeiBNhZF+E+W2kdp
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Registers COM server for autorun
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-