General
-
Target
PRICE REQUEST FOR ITEMS .doc
-
Size
25KB
-
Sample
221125-gtykjsag6s
-
MD5
03155cbe14d0f635c944d11de1f13516
-
SHA1
39034545bcea63c84b20a107df1c0bae88112a1b
-
SHA256
bf009ac1b3f046c23a2b4bbe3ad91ea7d6a6431007c0cf4bb4de095bf10d1511
-
SHA512
50e41a2f80f5a567c1eb51e7deb132c19344f7456948fbd15c1a921086172f57e496c2cf0a8591bfce1d2679ad464be410d72dc3f171e1e6da7b15992d21b03d
-
SSDEEP
768:WFx0XaIsnPRIa4fwJMPtznb3pintKkCRfN6UO4F0r:Wf0Xvx3EMP5DApCR8Ue
Static task
static1
Behavioral task
behavioral1
Sample
PRICE REQUEST FOR ITEMS .rtf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
PRICE REQUEST FOR ITEMS .rtf
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5577155192:AAEz6ZTkghx2RsdTxeeE-sDulPHc5WQblVg/
Targets
-
-
Target
PRICE REQUEST FOR ITEMS .doc
-
Size
25KB
-
MD5
03155cbe14d0f635c944d11de1f13516
-
SHA1
39034545bcea63c84b20a107df1c0bae88112a1b
-
SHA256
bf009ac1b3f046c23a2b4bbe3ad91ea7d6a6431007c0cf4bb4de095bf10d1511
-
SHA512
50e41a2f80f5a567c1eb51e7deb132c19344f7456948fbd15c1a921086172f57e496c2cf0a8591bfce1d2679ad464be410d72dc3f171e1e6da7b15992d21b03d
-
SSDEEP
768:WFx0XaIsnPRIa4fwJMPtznb3pintKkCRfN6UO4F0r:Wf0Xvx3EMP5DApCR8Ue
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-