General
-
Target
Payment Application.xls
-
Size
3.0MB
-
Sample
230616-nevcxaef87
-
MD5
47bbcc7603e9979b6dd4e9b4a50042f3
-
SHA1
ad926408828c4798c897a3eb2ac993be28fd28ea
-
SHA256
023587dfb8efcb39cb353a413c2773cfded347e5d8aec8086ececf395725237a
-
SHA512
208615995d1972f38718c6855084541f15ebb72d5350d827ceebf4392fe0ab0a8a3ece746508c62460b30c1b2419c32c336f0e4daff065d4aa250a502f291adb
-
SSDEEP
98304:Aor+AMF11Rtk25B9KheI8xC0sEFzwMpLte:/0/3Rl8+wMD
Static task
static1
Behavioral task
behavioral1
Sample
Payment Application.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Payment Application.xls
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
Payment Application.xls
-
Size
3.0MB
-
MD5
47bbcc7603e9979b6dd4e9b4a50042f3
-
SHA1
ad926408828c4798c897a3eb2ac993be28fd28ea
-
SHA256
023587dfb8efcb39cb353a413c2773cfded347e5d8aec8086ececf395725237a
-
SHA512
208615995d1972f38718c6855084541f15ebb72d5350d827ceebf4392fe0ab0a8a3ece746508c62460b30c1b2419c32c336f0e4daff065d4aa250a502f291adb
-
SSDEEP
98304:Aor+AMF11Rtk25B9KheI8xC0sEFzwMpLte:/0/3Rl8+wMD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-