General
-
Target
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.21344.4358.rtf
-
Size
3KB
-
Sample
221206-qt4w1acc83
-
MD5
53e0a65f4d1a5b5a0c8a7c267317c856
-
SHA1
e736a31e21c3e9e8bd9690cdbd3e834986e77618
-
SHA256
96e34da45bab0097eae12785e53c6b12036ed2cf60cbf2b18c9ace58689ce388
-
SHA512
efa88078c8d697b9fed6d35c10c9878895c159e72cd4761c3cbfb0b3c95aed1c4038e67ffd4281351602c5af5c74ab93ff68d0270ad19c35d1fa8b38f745494a
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.21344.4358.rtf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.21344.4358.rtf
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.21344.4358.rtf
-
Size
3KB
-
MD5
53e0a65f4d1a5b5a0c8a7c267317c856
-
SHA1
e736a31e21c3e9e8bd9690cdbd3e834986e77618
-
SHA256
96e34da45bab0097eae12785e53c6b12036ed2cf60cbf2b18c9ace58689ce388
-
SHA512
efa88078c8d697b9fed6d35c10c9878895c159e72cd4761c3cbfb0b3c95aed1c4038e67ffd4281351602c5af5c74ab93ff68d0270ad19c35d1fa8b38f745494a
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-