General
-
Target
Bank Slip & Payment Voucher.doc
-
Size
13KB
-
Sample
221101-x5hapsfcdj
-
MD5
d0a416b0a75f04913ad613c8a09610e8
-
SHA1
470b8cd5facfd77a5728b2720a6fa9249e046ac2
-
SHA256
0ad39ce3358ed09ef8973226c129a23c61c1de1dcb79d92d006dddd42ed59142
-
SHA512
dbc7cf0dec290891d631302008f155af5880fbb1d958acf6432f4c980395880e3572b09392ef5939e928dc19a56ba3bf51928660cf186fc4efe50375f1f93218
-
SSDEEP
384:ZqfvX+ThlSedosm+EvfHc80lVzcOSJXKvFgVIE9eF:weT95m+Evfu0FKNPaa
Static task
static1
Behavioral task
behavioral1
Sample
Bank Slip & Payment Voucher.rtf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Bank Slip & Payment Voucher.rtf
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
chukwuma22
Targets
-
-
Target
Bank Slip & Payment Voucher.doc
-
Size
13KB
-
MD5
d0a416b0a75f04913ad613c8a09610e8
-
SHA1
470b8cd5facfd77a5728b2720a6fa9249e046ac2
-
SHA256
0ad39ce3358ed09ef8973226c129a23c61c1de1dcb79d92d006dddd42ed59142
-
SHA512
dbc7cf0dec290891d631302008f155af5880fbb1d958acf6432f4c980395880e3572b09392ef5939e928dc19a56ba3bf51928660cf186fc4efe50375f1f93218
-
SSDEEP
384:ZqfvX+ThlSedosm+EvfHc80lVzcOSJXKvFgVIE9eF:weT95m+Evfu0FKNPaa
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-