General
-
Target
DD-180923.doc
-
Size
67KB
-
Sample
230919-hl48ssfd2z
-
MD5
2bc2dfb3239184145052bd681d770246
-
SHA1
f8525b5625359aff514f9887be92d3e85d673215
-
SHA256
730d905447a0ecde0d2460315f70588922508fac7e03c9368878929cf1b431fe
-
SHA512
b0228a782b9353cdbec03abb17ec483b6aa5a1d44e1a619519a0689e00e9dc393b40b41add60ee204b5dc89a92eec8a487b518ac33931f1a188811be6c415116
-
SSDEEP
768:YwAbZSibMX9gRWjijyWJ64MzyQo/SboNT3NqU:YwAlRJVJ6XyZjNTZ
Static task
static1
Behavioral task
behavioral1
Sample
DD-180923.rtf
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
DD-180923.rtf
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
obilogs@hulkeng.xyz - Password:
7213575aceACE@ - Email To:
obilogs@hulkeng.xyz
Targets
-
-
Target
DD-180923.doc
-
Size
67KB
-
MD5
2bc2dfb3239184145052bd681d770246
-
SHA1
f8525b5625359aff514f9887be92d3e85d673215
-
SHA256
730d905447a0ecde0d2460315f70588922508fac7e03c9368878929cf1b431fe
-
SHA512
b0228a782b9353cdbec03abb17ec483b6aa5a1d44e1a619519a0689e00e9dc393b40b41add60ee204b5dc89a92eec8a487b518ac33931f1a188811be6c415116
-
SSDEEP
768:YwAbZSibMX9gRWjijyWJ64MzyQo/SboNT3NqU:YwAlRJVJ6XyZjNTZ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-