General
-
Target
RFQ20221123.doc
-
Size
25KB
-
Sample
221123-qxdh8aab2y
-
MD5
6b2016dc99a6adbb0f7354674e5db3f4
-
SHA1
a5e510cd04b00a59e486520f629d7942211e3044
-
SHA256
f6ff722eb25d04d2d6a8f024c4e570abb07b4450fd14fbd491230b9953c5032f
-
SHA512
fd03c6a717185f3017cccac70f572558d40019378853702cdfba12eab02b48d3dd5fa4b9e85cae3f7934954660653c0fc982ba1c47028420ac32b3ec8a70db41
-
SSDEEP
768:YFx0XaIsnPRIa4fwJDEgyQapsGdcf4A/QyoVZIkvvE:Yf0Xvx3EDrb3G+AA/Q3wkHE
Static task
static1
Behavioral task
behavioral1
Sample
RFQ20221123.rtf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RFQ20221123.rtf
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.euroinkchemical.ro - Port:
587 - Username:
[email protected] - Password:
comercial2016@ - Email To:
[email protected]
Targets
-
-
Target
RFQ20221123.doc
-
Size
25KB
-
MD5
6b2016dc99a6adbb0f7354674e5db3f4
-
SHA1
a5e510cd04b00a59e486520f629d7942211e3044
-
SHA256
f6ff722eb25d04d2d6a8f024c4e570abb07b4450fd14fbd491230b9953c5032f
-
SHA512
fd03c6a717185f3017cccac70f572558d40019378853702cdfba12eab02b48d3dd5fa4b9e85cae3f7934954660653c0fc982ba1c47028420ac32b3ec8a70db41
-
SSDEEP
768:YFx0XaIsnPRIa4fwJDEgyQapsGdcf4A/QyoVZIkvvE:Yf0Xvx3EDrb3G+AA/Q3wkHE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-