General
-
Target
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.15559.24662.rtf
-
Size
33KB
-
Sample
221205-t38s4agb75
-
MD5
b37b91e94861e4515bf3d78328f73ba5
-
SHA1
688fb6633a4c08529231e69d5e7ec331f5bbbddd
-
SHA256
6a5116dae3e3873885e1a98b06af60d65ff2da2e7971eedcff92ab965b7f74a0
-
SHA512
eb01c892c4f17936818ec7017e195368a032740e447cd1417d39707bc9e06b2b8e0afc38b099363fa477685fbfb426f546539f9c322c27131dc066a83c2a2fa2
-
SSDEEP
768:nFx0XaIsnPRIa4fwJMBq9atgaqkvoLCMN5rHBMNBy1x3:nf0Xvx3EMEkyaqsaCMb+By1x3
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.15559.24662.rtf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.15559.24662.rtf
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.valvulasthermovalve.cl - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.valvulasthermovalve.cl/ - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Targets
-
-
Target
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.15559.24662.rtf
-
Size
33KB
-
MD5
b37b91e94861e4515bf3d78328f73ba5
-
SHA1
688fb6633a4c08529231e69d5e7ec331f5bbbddd
-
SHA256
6a5116dae3e3873885e1a98b06af60d65ff2da2e7971eedcff92ab965b7f74a0
-
SHA512
eb01c892c4f17936818ec7017e195368a032740e447cd1417d39707bc9e06b2b8e0afc38b099363fa477685fbfb426f546539f9c322c27131dc066a83c2a2fa2
-
SSDEEP
768:nFx0XaIsnPRIa4fwJMBq9atgaqkvoLCMN5rHBMNBy1x3:nf0Xvx3EMEkyaqsaCMb+By1x3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-