General
-
Target
ENTIRE_MESSAGE.eml
-
Size
349KB
-
Sample
230719-t97jlsad7z
-
MD5
ce1eed4fff6022a3720903ac5b3dfae9
-
SHA1
a2fbffe281ee7d33cce3b0b273806081bf7173e2
-
SHA256
33bb69fba4ec574981f478570c36a2375095de37f98e2710191f678f03c1d232
-
SHA512
d2302c41feef71424aabddd801dabf49eb3e95c4bd57120edeac6bf026aa72d4e063c569a4a813abd9904778ef9ba80b3e7965e7a3ce061b11e6afb3c3a19aa3
-
SSDEEP
3072:aeTNO6HTncCrv1uzgewt67ubW3bfKZ0lI+7uq0Hz+9M//FIWorPCvWvrEm:aeBzncau8/t67/bfKZqv7uq0To+sHj
Static task
static1
Behavioral task
behavioral1
Sample
July 19.xll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
July 19.xll
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
July 19.xll
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
July 19.xll
Resource
win10v2004-20230703-en
Malware Config
Extracted
Extracted
agenttesla
Protocol: smtp- Host:
lh3.monovm.com - Port:
587 - Username:
[email protected] - Password:
Freestyle@12345 - Email To:
[email protected]
Targets
-
-
Target
July 19.odc
-
Size
142KB
-
MD5
e2600a5d9aaaf6d81e0d68ec2ca71361
-
SHA1
e8f6f376f4ae1e669c8c1a051bf61ad37d16ec1b
-
SHA256
a686a75059f0b09c102bf4e39e21c456e43d82608af522c2797983805532e0f1
-
SHA512
08d45e4dbed27d079bc0ef6f1024b12cdebb98e0ac53d4baffe5a4f8a64bdf224d86ecbdf2d2ba8e8a191900937cee523d85ebb30860e32bafbdc5417d947aac
-
SSDEEP
1536:/Z0gocO2fef1HL17B0rkVFd3Gxou3u22msPBZH+R6zXqAJl:/2TcO2fG1r17BYkjd3Zu3u22msPBEm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
July 19.xls
-
Size
115KB
-
MD5
118865e6a775e2e872ec21a8ad67354f
-
SHA1
58e499c9aa1f98000a5e71e0880a907ffe393a32
-
SHA256
d36c54c62ad04ef56cf79afbcc326eb8050f53a94fed415ba2baf829d2b5032a
-
SHA512
eee66e4e0bd233676ce19e1c686d903349f246482e8689d28d2225a348420b6cc99ab13ab57796a7ff3473f98055603420509ff4f41e7a6eea2d970b23c2c04b
-
SSDEEP
768:0pjSPSX/22K6TePz2tIRfNTrLZ6YZI9CatrPzYtJ5KGHNh//z317:euaX/o6T2z4W1PZy9CatrPcPEGthXzF
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-