General
-
Target
Invoice-VE 2022.xlsx
-
Size
597KB
-
Sample
221006-l58xwahcdp
-
MD5
2b2b89ac962ffdd39096be0b76bb184b
-
SHA1
6bac70c673543e8d4f5c9e3143b860d9841fd4fd
-
SHA256
dca1bbe366193fa0bc12a708f3873a5fc0ca9c56378c2275e24d9ed37034e9d6
-
SHA512
2ed5527d4b1e376980214cea41be37659de79dc635b0e5c69fec5b42d239330c4b1d4f259ebec1d0ce05ba0eb4b9c9c6df04708a970fc149733afea242ffdaa2
-
SSDEEP
12288:mVhc9AFij/oTquIeUTtNd+bxVdLW4ZpOc9bJNrfag:ohc9s9quLONuXoAtNGg
Static task
static1
Behavioral task
behavioral1
Sample
Invoice-VE 2022.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Invoice-VE 2022.xlsx
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5508236836:AAFWgQnjxVK5WcJGJYoL3kmrCQIOg7yCfKI/sendDocument
Targets
-
-
Target
Invoice-VE 2022.xlsx
-
Size
597KB
-
MD5
2b2b89ac962ffdd39096be0b76bb184b
-
SHA1
6bac70c673543e8d4f5c9e3143b860d9841fd4fd
-
SHA256
dca1bbe366193fa0bc12a708f3873a5fc0ca9c56378c2275e24d9ed37034e9d6
-
SHA512
2ed5527d4b1e376980214cea41be37659de79dc635b0e5c69fec5b42d239330c4b1d4f259ebec1d0ce05ba0eb4b9c9c6df04708a970fc149733afea242ffdaa2
-
SSDEEP
12288:mVhc9AFij/oTquIeUTtNd+bxVdLW4ZpOc9bJNrfag:ohc9s9quLONuXoAtNGg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-