General
-
Target
SWIFT DETAILS 880.xls
-
Size
1.3MB
-
Sample
230302-pl66qace4v
-
MD5
7f49b8b2255418be5455193efc2e23d0
-
SHA1
f0d82e029d5849556f448d2871640712ae356856
-
SHA256
83263ffc77883d837d86f0245cab740b53f033b42a38a03b6fe6e4c4efc78e95
-
SHA512
890ed223b5757baf1ea02155e6eefa476511d3e74fc543ecc5e80c8e20595b2243c8460c31bbe3fc5fb8d9e1d2e7235ea23487647698c4646e1016754c0fabb5
-
SSDEEP
24576:hLKCWQmmav30xaBKWQmmav30xRyWQmmav30xrBkIWQmmav30xE6EDtOpoufjbeXX:hLKHQmmQ30gFQmmQ3073QmmQ30lSdQmB
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT DETAILS 880.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SWIFT DETAILS 880.xls
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
aaUW!^r5 aaUW!^r5 - Email To:
[email protected]
Targets
-
-
Target
SWIFT DETAILS 880.xls
-
Size
1.3MB
-
MD5
7f49b8b2255418be5455193efc2e23d0
-
SHA1
f0d82e029d5849556f448d2871640712ae356856
-
SHA256
83263ffc77883d837d86f0245cab740b53f033b42a38a03b6fe6e4c4efc78e95
-
SHA512
890ed223b5757baf1ea02155e6eefa476511d3e74fc543ecc5e80c8e20595b2243c8460c31bbe3fc5fb8d9e1d2e7235ea23487647698c4646e1016754c0fabb5
-
SSDEEP
24576:hLKCWQmmav30xaBKWQmmav30xRyWQmmav30xrBkIWQmmav30xE6EDtOpoufjbeXX:hLKHQmmQ30gFQmmQ3073QmmQ30lSdQmB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-