General
-
Target
SecuriteInfo.com.Exploit.CVE-2018-0798.4.22910.26534.rtf
-
Size
24KB
-
Sample
221123-p4nr4aga41
-
MD5
9840b28dccdefdd60cded7e28c82dea9
-
SHA1
b0f8d8b2938d929beab034795597fff5f4dac137
-
SHA256
e09e2133513b68311b4e451245b5a705bd520e30225af926d6a9d45229c7d2f7
-
SHA512
4713444b3f139c3e444177fd57ee698a505edb9f76dfa88b6beeda0b5b0164475a21c9c94ff140e68abc8bb0b27a5c56bea71bd99c4901d61b1f2f4073371c93
-
SSDEEP
384:OQMmdOFNYY0aaaIswqPeOrka1+fHQJ+t3rQkRhZ4XgvHJKF7pz6bOUMUrMAMl3i+:qFx0XaIsnPRIa4fwJM/KFtzsJMCM/i+
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.CVE-2018-0798.4.22910.26534.rtf
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Exploit.CVE-2018-0798.4.22910.26534.rtf
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5826208898:AAHq1wGhT3E-mEl-_VCUxWwOZtnwnWe6Rp0/
Targets
-
-
Target
SecuriteInfo.com.Exploit.CVE-2018-0798.4.22910.26534.rtf
-
Size
24KB
-
MD5
9840b28dccdefdd60cded7e28c82dea9
-
SHA1
b0f8d8b2938d929beab034795597fff5f4dac137
-
SHA256
e09e2133513b68311b4e451245b5a705bd520e30225af926d6a9d45229c7d2f7
-
SHA512
4713444b3f139c3e444177fd57ee698a505edb9f76dfa88b6beeda0b5b0164475a21c9c94ff140e68abc8bb0b27a5c56bea71bd99c4901d61b1f2f4073371c93
-
SSDEEP
384:OQMmdOFNYY0aaaIswqPeOrka1+fHQJ+t3rQkRhZ4XgvHJKF7pz6bOUMUrMAMl3i+:qFx0XaIsnPRIa4fwJM/KFtzsJMCM/i+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-