General
-
Target
9019.xls
-
Size
1.1MB
-
Sample
230224-qpnn8abd66
-
MD5
e43ad32b14cf514db21c3f42b395bf91
-
SHA1
9a3a51fb5363dcf18279fc0cb32f55e35c438a7c
-
SHA256
d4e784b7a5cd9c8c2e8838b4b74e5cde203f069e56a4eb9f352e35148f4a30e0
-
SHA512
2d550d9167bf0f7dab3d2fdca5d08c8a5635b560a981f9aeaed3584b590fdb3ef79ddd03c7516de2c9f8dd9c00de41cc610245edee5555bc2857e9e8db0fbaeb
-
SSDEEP
24576:3Femy5hspmq1gkOFelnCEezjnk6mgTCTeyszEQrp31XAd6Fv1ib5XXXXXXXXXXXN:VOk+PQhOIOThhzEw3xM6Fu
Behavioral task
behavioral1
Sample
9019.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9019.xls
Resource
win10v2004-20230220-en
Malware Config
Extracted
purecrypter
http://www.ugr.leszczynskie.net/galeria/Xcilfp.png
Targets
-
-
Target
9019.xls
-
Size
1.1MB
-
MD5
e43ad32b14cf514db21c3f42b395bf91
-
SHA1
9a3a51fb5363dcf18279fc0cb32f55e35c438a7c
-
SHA256
d4e784b7a5cd9c8c2e8838b4b74e5cde203f069e56a4eb9f352e35148f4a30e0
-
SHA512
2d550d9167bf0f7dab3d2fdca5d08c8a5635b560a981f9aeaed3584b590fdb3ef79ddd03c7516de2c9f8dd9c00de41cc610245edee5555bc2857e9e8db0fbaeb
-
SSDEEP
24576:3Femy5hspmq1gkOFelnCEezjnk6mgTCTeyszEQrp31XAd6Fv1ib5XXXXXXXXXXXN:VOk+PQhOIOThhzEw3xM6Fu
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-