General
-
Target
Overdue Statement of Account_1.docx.doc
-
Size
10KB
-
Sample
230420-jptf5sgd66
-
MD5
397c47ede0b01a7145478c1c1ebfecad
-
SHA1
2f8398ddc426bcbaac364e6339b77b8e807c8fa4
-
SHA256
c14068b312c53040f23e40aca6a6251d2330b1ec6874061b50ebb7e6800fda29
-
SHA512
7eed78e77302ca07dca6926bf1deb2a0c0630d749811a1fc3d45e19aefb88b0ccb953a3e3782cb43901dc72bda73e8b5e9dd466a2421d5a16c6fb08a51bd94af
-
SSDEEP
192:ScIMmtPGT7G/bIwXOVORtKz5SEzBC4vNq6sM63SR:SPXuT+xXOVOSdhlqH2
Static task
static1
Behavioral task
behavioral1
Sample
Overdue Statement of Account_1.docx
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Overdue Statement of Account_1.docx
Resource
win10v2004-20230220-en
Malware Config
Extracted
http://%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%22IIOOOWOEOEOEOEOEOEOISISODOEOEOEOODOOOOOOWWOWOQQQOWOWOWOWOIIIDIIFIFIWOEOEOEOIFIDIFODFI@1806682825/e/%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23%23.doc
Targets
-
-
Target
Overdue Statement of Account_1.docx.doc
-
Size
10KB
-
MD5
397c47ede0b01a7145478c1c1ebfecad
-
SHA1
2f8398ddc426bcbaac364e6339b77b8e807c8fa4
-
SHA256
c14068b312c53040f23e40aca6a6251d2330b1ec6874061b50ebb7e6800fda29
-
SHA512
7eed78e77302ca07dca6926bf1deb2a0c0630d749811a1fc3d45e19aefb88b0ccb953a3e3782cb43901dc72bda73e8b5e9dd466a2421d5a16c6fb08a51bd94af
-
SSDEEP
192:ScIMmtPGT7G/bIwXOVORtKz5SEzBC4vNq6sM63SR:SPXuT+xXOVOSdhlqH2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Abuses OpenXML format to download file from external location
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-