General
-
Target
0ce92c69d3ae2eb48177fdfc3bdb6f92
-
Size
18KB
-
Sample
220927-yzqwbsfefm
-
MD5
0ce92c69d3ae2eb48177fdfc3bdb6f92
-
SHA1
226a04ab66d4c8157eefd3489e47991a29e66416
-
SHA256
bfecb0f0883945eeef30b2282d11745ad90030cd3887d63b17b7dd08dcb04d8b
-
SHA512
76254f216d8c7c21885bb6178e37016288ebd3f8248c5b90125acccb50f69323becbc70b95465ba4cdffdcf6fcccd77b60026f778417cbeff405e8ee33ffd4e5
-
SSDEEP
384:gu9S523ZZ+yG8UxMPJfKSvsgip1gAMI3jpeU1UBz3:T9SiPG8UUJfKkEp1OojpsB7
Static task
static1
Behavioral task
behavioral1
Sample
Revised PI.rtf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Revised PI.rtf
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.xy4fltness.com - Port:
587 - Username:
[email protected] - Password:
FXAGE@C9
Targets
-
-
Target
Revised PI.doc
-
Size
12KB
-
MD5
4e253e5033611ce12951270da35533ad
-
SHA1
6b53acb30e886b8c9f28e90ff53da88d5c1b7cc7
-
SHA256
11cb3310f51dc8a6e4ebce06a520344e39ef3b1eba3244ca5b76a15c9d81aafe
-
SHA512
ad8d82f869fbe91a12281f0ff13e784633e4e442e6ea06d20026484d813dede0bab777117ffe4c2bd5eb972628417b0845ef8a6649c319a21d8ac0aa2606605d
-
SSDEEP
192:YweFxa73WKE5AxD3NKMzreoquisPK1AKYKQkVxFLLXm8kxIftZ:O+/1PSHVznWotZ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-