General
-
Target
RFQ20221123.doc
-
Size
25KB
-
Sample
221123-qxdh8afa84
-
MD5
3f6c7ad16cf47199a9dfbe2944554ef4
-
SHA1
eae5ac08cc4cb0da9561dde7e64d323e83b20f7b
-
SHA256
c2d3f8d87feaec6e82fbce209dd28929b7567ba62713522dd9b0d149b09993a7
-
SHA512
845be468e7a9ad292757627bda34efa636da5c45f4d28264c44d18efd82e78ea71b419873b93e6bec5e6893eccc3645e2cea7c34cda5eccf55cc26e4be19f3e0
-
SSDEEP
768:TFx0XaIsnPRIa4fwJMEgyQapsGdcf4A/QyoVZIkvvE:Tf0Xvx3EMrb3G+AA/Q3wkHE
Static task
static1
Behavioral task
behavioral1
Sample
RFQ20221123.rtf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RFQ20221123.rtf
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.euroinkchemical.ro - Port:
587 - Username:
[email protected] - Password:
comercial2016@ - Email To:
[email protected]
Targets
-
-
Target
RFQ20221123.doc
-
Size
25KB
-
MD5
3f6c7ad16cf47199a9dfbe2944554ef4
-
SHA1
eae5ac08cc4cb0da9561dde7e64d323e83b20f7b
-
SHA256
c2d3f8d87feaec6e82fbce209dd28929b7567ba62713522dd9b0d149b09993a7
-
SHA512
845be468e7a9ad292757627bda34efa636da5c45f4d28264c44d18efd82e78ea71b419873b93e6bec5e6893eccc3645e2cea7c34cda5eccf55cc26e4be19f3e0
-
SSDEEP
768:TFx0XaIsnPRIa4fwJMEgyQapsGdcf4A/QyoVZIkvvE:Tf0Xvx3EMrb3G+AA/Q3wkHE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-