General
-
Target
BOOKING- SHIPMENT DOCS- ORDER # 10038574 & 10038565.doc
-
Size
25KB
-
Sample
221207-xq538aff96
-
MD5
76ce4cfe5dad029abff24fc30be1403d
-
SHA1
effbcd4525862d04b16cc0147847af534c0de83d
-
SHA256
9556c06806c14dfcfc716d3d8ec91fff72cf5fefee8c28c77af9c07d915895b9
-
SHA512
a39b4532a0b46ddcae44a1bea090b1d6cdd81047a8509431f42ff8f4e9cec909474a3a01e33fc02def6703538db66ff462258d2a2af5aa4e2c00a20e065bed32
-
SSDEEP
768:KFx0XaIsnPRIa4fwJMjpIAO/G94/gjFUGm:Kf0Xvx3EMyTG94IRg
Static task
static1
Behavioral task
behavioral1
Sample
BOOKING- SHIPMENT DOCS- ORDER # 10038574 & 10038565.rtf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
BOOKING- SHIPMENT DOCS- ORDER # 10038574 & 10038565.rtf
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
DreamChaser101
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
DreamChaser101
Targets
-
-
Target
BOOKING- SHIPMENT DOCS- ORDER # 10038574 & 10038565.doc
-
Size
25KB
-
MD5
76ce4cfe5dad029abff24fc30be1403d
-
SHA1
effbcd4525862d04b16cc0147847af534c0de83d
-
SHA256
9556c06806c14dfcfc716d3d8ec91fff72cf5fefee8c28c77af9c07d915895b9
-
SHA512
a39b4532a0b46ddcae44a1bea090b1d6cdd81047a8509431f42ff8f4e9cec909474a3a01e33fc02def6703538db66ff462258d2a2af5aa4e2c00a20e065bed32
-
SSDEEP
768:KFx0XaIsnPRIa4fwJMjpIAO/G94/gjFUGm:Kf0Xvx3EMyTG94IRg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-