General
-
Target
ECS9522022121320540019_16334.doc
-
Size
33KB
-
Sample
230109-kd568sha7x
-
MD5
eb896645a74ec0e2e1936d5c5ef8095f
-
SHA1
4e006d71b45f242f2a55c881e8ae1dcb61a9ea7e
-
SHA256
b8ad851192cdc77a5b0ece183a574bdfd1e0ae2a8ba6a5d2532d11dae7b22595
-
SHA512
7c5d1f046710a51cd17cdb6dafd34de20afc9809631d00e7777d0200db0a57bb358c5cc1f5d3041413b54011080c83703ac8db383bb595ac6e7ff196356cf8aa
-
SSDEEP
768:yFx0XaIsnPRIa4fwJM9KGRxqGAW0PJOUJsJhBtnkK2ZdyXU5ukmm26Y:yf0Xvx3EMnxjAWolJsb/kKoS2ukmm2p
Static task
static1
Behavioral task
behavioral1
Sample
ECS9522022121320540019_16334.rtf
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ECS9522022121320540019_16334.rtf
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
hnxqezadblabdsss
Targets
-
-
Target
ECS9522022121320540019_16334.doc
-
Size
33KB
-
MD5
eb896645a74ec0e2e1936d5c5ef8095f
-
SHA1
4e006d71b45f242f2a55c881e8ae1dcb61a9ea7e
-
SHA256
b8ad851192cdc77a5b0ece183a574bdfd1e0ae2a8ba6a5d2532d11dae7b22595
-
SHA512
7c5d1f046710a51cd17cdb6dafd34de20afc9809631d00e7777d0200db0a57bb358c5cc1f5d3041413b54011080c83703ac8db383bb595ac6e7ff196356cf8aa
-
SSDEEP
768:yFx0XaIsnPRIa4fwJM9KGRxqGAW0PJOUJsJhBtnkK2ZdyXU5ukmm26Y:yf0Xvx3EMnxjAWolJsb/kKoS2ukmm2p
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-