General
-
Target
Docs.exe
-
Size
902KB
-
Sample
220930-qvnamseehn
-
MD5
d63bc4ad5fcf9c970ea56abf2619f8d3
-
SHA1
42e7d7bf12ccdc7c132bb2c4cc26a74add7cfbac
-
SHA256
97fcc96f5cabb14de13c297ee437dedec50fe6038e5ad2708721114a63ee594a
-
SHA512
76b5e1640a608a9e07648da16cc585b941a7da2142aadce5499be8e4355b4defe2f072c9ec15bb827ea0d87536693784ef186ff31a734e4290ec0ebf2a798616
-
SSDEEP
12288:MQYt2iNOAmdwwCgXCRNCyqkP1wMbVTP1RdqjJ5nLmcYUMtf3eizCaMGmSZB3mOI4:yt1yNoRNCf+1w+Vb1GjrLM
Static task
static1
Behavioral task
behavioral1
Sample
Docs.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Docs.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.multifastners.net - Port:
587 - Username:
[email protected] - Password:
eqr3J[&x}Wv?OpZ#Aa
Targets
-
-
Target
Docs.exe
-
Size
902KB
-
MD5
d63bc4ad5fcf9c970ea56abf2619f8d3
-
SHA1
42e7d7bf12ccdc7c132bb2c4cc26a74add7cfbac
-
SHA256
97fcc96f5cabb14de13c297ee437dedec50fe6038e5ad2708721114a63ee594a
-
SHA512
76b5e1640a608a9e07648da16cc585b941a7da2142aadce5499be8e4355b4defe2f072c9ec15bb827ea0d87536693784ef186ff31a734e4290ec0ebf2a798616
-
SSDEEP
12288:MQYt2iNOAmdwwCgXCRNCyqkP1wMbVTP1RdqjJ5nLmcYUMtf3eizCaMGmSZB3mOI4:yt1yNoRNCf+1w+Vb1GjrLM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-