General
-
Target
list items.doc
-
Size
70KB
-
Sample
230919-qs7aqshc4t
-
MD5
47134ca4d7a6fc6a015113fc7db53b05
-
SHA1
10eac55afddc0120ff49d4cb9239f2d9110eaac8
-
SHA256
29f40b440f9ba83b9840828e3fadbcf22697008bb52befef98c834008da6616c
-
SHA512
bc7a0ff39cd46efbf55a17b112658038830c3b548933acb52eef4bab55b6684f7b32a45bca2568762f03abaf7df76099f88039d9ac8d05c39d16f31059ba8ffb
-
SSDEEP
768:NwAbZSibMX9gRWjc1n5RYddbxHRcgYxESDSVu+N6MoUe47:NwAlRP5R6bxxcN2Vu+2Rs
Static task
static1
Behavioral task
behavioral1
Sample
list items.rtf
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
list items.rtf
Resource
win10v2004-20230915-en
Malware Config
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
list items.doc
-
Size
70KB
-
MD5
47134ca4d7a6fc6a015113fc7db53b05
-
SHA1
10eac55afddc0120ff49d4cb9239f2d9110eaac8
-
SHA256
29f40b440f9ba83b9840828e3fadbcf22697008bb52befef98c834008da6616c
-
SHA512
bc7a0ff39cd46efbf55a17b112658038830c3b548933acb52eef4bab55b6684f7b32a45bca2568762f03abaf7df76099f88039d9ac8d05c39d16f31059ba8ffb
-
SSDEEP
768:NwAbZSibMX9gRWjc1n5RYddbxHRcgYxESDSVu+N6MoUe47:NwAlRP5R6bxxcN2Vu+2Rs
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-