General
-
Target
PO207790.xls
-
Size
1.7MB
-
Sample
230616-q3jbnaeh91
-
MD5
b12ed68cdbac917994444b5d30d84043
-
SHA1
137fb253ae433cabddfebba9c9e541cc49b8f8ce
-
SHA256
c81a1afc4f9e8588907d1cdb78b0bb50ab10a5a4cffe2022ad8dfa1e749a6ca2
-
SHA512
65bf6400a84ac4b1d00db8e3e2234057c0f0eed33eb9c30ffec60cdd6d820f781a5a7eef42b44d7e5bb15bc7be2d77514437ede64e463ac0660021d660f6e888
-
SSDEEP
24576:Eu9VDt6IE3ziabzu9VSt6IE3ziabUnaWsyVZWgSPqkZjl1F:EuLt6Iza3uKt6IzaGs6NSS0Z
Static task
static1
Behavioral task
behavioral1
Sample
PO207790.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PO207790.xls
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
PO207790.xls
-
Size
1.7MB
-
MD5
b12ed68cdbac917994444b5d30d84043
-
SHA1
137fb253ae433cabddfebba9c9e541cc49b8f8ce
-
SHA256
c81a1afc4f9e8588907d1cdb78b0bb50ab10a5a4cffe2022ad8dfa1e749a6ca2
-
SHA512
65bf6400a84ac4b1d00db8e3e2234057c0f0eed33eb9c30ffec60cdd6d820f781a5a7eef42b44d7e5bb15bc7be2d77514437ede64e463ac0660021d660f6e888
-
SSDEEP
24576:Eu9VDt6IE3ziabzu9VSt6IE3ziabUnaWsyVZWgSPqkZjl1F:EuLt6Iza3uKt6IzaGs6NSS0Z
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-