General
-
Target
NEW ORDER.xls
-
Size
1.7MB
-
Sample
230801-mtd4ssgd6s
-
MD5
345dc5533c4c20b89d20e75aff3023fe
-
SHA1
d05b645116d0ee6806fb9e4026220aac3e0709bd
-
SHA256
7332e56b52d0993782b3e13e6ebcfb45d6fdb7367e46a3eafe1bae387817ccef
-
SHA512
d140bf41d169e12539437ca7a0e1e97c64d0059d2d3112a280d8e862a35a5f1c61b68df94b3b0fe374824b33ac83dfe65be9c2d1241ffbfdc583be7060bdaaf7
-
SSDEEP
49152:tQmmQ30kupp6VNQmmQ308556V8iNhv3tBfXCnSgk6+iv:tpmQkkamNpmQkOm8MhrCA6
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER.xls
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NEW ORDER.xls
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
kV$bSqJ1 daniel - Email To:
[email protected]
Targets
-
-
Target
NEW ORDER.xls
-
Size
1.7MB
-
MD5
345dc5533c4c20b89d20e75aff3023fe
-
SHA1
d05b645116d0ee6806fb9e4026220aac3e0709bd
-
SHA256
7332e56b52d0993782b3e13e6ebcfb45d6fdb7367e46a3eafe1bae387817ccef
-
SHA512
d140bf41d169e12539437ca7a0e1e97c64d0059d2d3112a280d8e862a35a5f1c61b68df94b3b0fe374824b33ac83dfe65be9c2d1241ffbfdc583be7060bdaaf7
-
SSDEEP
49152:tQmmQ30kupp6VNQmmQ308556V8iNhv3tBfXCnSgk6+iv:tpmQkkamNpmQkOm8MhrCA6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-