General
-
Target
cancelled order.doc
-
Size
29KB
-
Sample
230413-m99kmscc8x
-
MD5
868886bf11eb7785316e883965316d46
-
SHA1
b8a6181ee08c3f7477a7032f75f93a8071d0a2d5
-
SHA256
ef8ae5a2ff20ab491f2634ed620057e7729b2bdd50c433a2e1cb8f4563b00510
-
SHA512
fe29e4028a5d87047cf684dfdfcbb05d089830424f758985440a2f218c6cf9fc12db392012bac0d0aeef775e9a6858f07b045fe88f8702b7c74ee868add8d6c8
-
SSDEEP
768:OFx0XaIsnPRIa4fwJMuC8l6g79S5TimN7n9FA3HUde:Of0Xvx3EMeUg85Tiin9FA3HUM
Static task
static1
Behavioral task
behavioral1
Sample
cancelled order.rtf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cancelled order.rtf
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.valvulasthermovalve.cl - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Targets
-
-
Target
cancelled order.doc
-
Size
29KB
-
MD5
868886bf11eb7785316e883965316d46
-
SHA1
b8a6181ee08c3f7477a7032f75f93a8071d0a2d5
-
SHA256
ef8ae5a2ff20ab491f2634ed620057e7729b2bdd50c433a2e1cb8f4563b00510
-
SHA512
fe29e4028a5d87047cf684dfdfcbb05d089830424f758985440a2f218c6cf9fc12db392012bac0d0aeef775e9a6858f07b045fe88f8702b7c74ee868add8d6c8
-
SSDEEP
768:OFx0XaIsnPRIa4fwJMuC8l6g79S5TimN7n9FA3HUde:Of0Xvx3EMeUg85Tiin9FA3HUM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-