General
-
Target
priceandavailability.doc
-
Size
62KB
-
Sample
230307-pg6z6ahc7s
-
MD5
8d074b8561b7bbaa71fd8dba9fceea7a
-
SHA1
b2ecc0f79937c68157faa4360be5680225f4dbf0
-
SHA256
96c9a2419e229bd026e7b73ad44ae7816d10e8aa3cec41e8de73f89edf430286
-
SHA512
ff56f2029b408fc54a637adbb5be2c5a4e9123d19fc9b944a8d38c4d19a7321e5cba009c15ba5ab8fa1be6d1594e4e30dac54f2af842bda3ffc3cf0e54339148
-
SSDEEP
1536:QwAlHZromd3Ciyqo0FcbGbP8VL9IEzQV3ZuD2Q0Fx5e/9HjCZDrw52vmYvYfI:QwAlHZroS3JyqoiTP8VL9ICm3ZuD2Q0j
Static task
static1
Behavioral task
behavioral1
Sample
priceandavailability.rtf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
priceandavailability.rtf
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
priceandavailability.doc
-
Size
62KB
-
MD5
8d074b8561b7bbaa71fd8dba9fceea7a
-
SHA1
b2ecc0f79937c68157faa4360be5680225f4dbf0
-
SHA256
96c9a2419e229bd026e7b73ad44ae7816d10e8aa3cec41e8de73f89edf430286
-
SHA512
ff56f2029b408fc54a637adbb5be2c5a4e9123d19fc9b944a8d38c4d19a7321e5cba009c15ba5ab8fa1be6d1594e4e30dac54f2af842bda3ffc3cf0e54339148
-
SSDEEP
1536:QwAlHZromd3Ciyqo0FcbGbP8VL9IEzQV3ZuD2Q0Fx5e/9HjCZDrw52vmYvYfI:QwAlHZroS3JyqoiTP8VL9ICm3ZuD2Q0j
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-