General
-
Target
Order 2550619.xls
-
Size
1.7MB
-
Sample
230309-wqarmshe68
-
MD5
ab0e612c9439b82195398504a698adee
-
SHA1
70c4113ed426af85cc7c5e37b35f8f061c15c5f0
-
SHA256
9134e36de0aacecf0cab994a307c42bd76a067d032545e74328d1c29c6389ebd
-
SHA512
90741688665e6fa8c9a91b63ebaa956ad366cb268436034c19e7e133d8d564c1e95c6cacdc76ef5196adcb665ebe4a0bfa6383c3f996a9ec6b56c1472be02c3e
-
SSDEEP
49152:hLKe3Z7sQmmQ30d727UQmmQ30R6Nn1h9DB6GOLD5:lhspmQkl6UpmQkR6rhPON
Static task
static1
Behavioral task
behavioral1
Sample
Order 2550619.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Order 2550619.xls
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
jCXzqcP1 daniel 3116 - Email To:
[email protected]
Targets
-
-
Target
Order 2550619.xls
-
Size
1.7MB
-
MD5
ab0e612c9439b82195398504a698adee
-
SHA1
70c4113ed426af85cc7c5e37b35f8f061c15c5f0
-
SHA256
9134e36de0aacecf0cab994a307c42bd76a067d032545e74328d1c29c6389ebd
-
SHA512
90741688665e6fa8c9a91b63ebaa956ad366cb268436034c19e7e133d8d564c1e95c6cacdc76ef5196adcb665ebe4a0bfa6383c3f996a9ec6b56c1472be02c3e
-
SSDEEP
49152:hLKe3Z7sQmmQ30d727UQmmQ30R6Nn1h9DB6GOLD5:lhspmQkl6UpmQkR6rhPON
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-