General
-
Target
Orden Roch-CVE6422-TVOP.xlam
-
Size
666KB
-
Sample
231010-1fpv2ace8y
-
MD5
5edda4e170c74a69835e8bd822c51803
-
SHA1
daf25f4e5eff37fe7677ce3139b0042a3ec5e236
-
SHA256
0b8fa64ce20b4cedd71c6e36261052f0ac8948ea296c6ada5791c90d563c7e6a
-
SHA512
b254db2d0d3c23490334df11c368d3bf6c8b4647bd1c4ea5e413bef5e8d9e6aa6cb2b936bb59b85b3767d9630fed389edc30ed2b5bfc13402b22b6f0a1587fe8
-
SSDEEP
12288:WTaUMotvoZmtEEPnBu4fYbHI4LXP+FEXpH1YUyKgOm9oQbvs6:/UNEsnBu4fgIm+FiVYUyKgl9oQTN
Static task
static1
Behavioral task
behavioral1
Sample
Orden Roch-CVE6422-TVOP.xlam
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Orden Roch-CVE6422-TVOP.xlam
Resource
win10-20230915-en
Behavioral task
behavioral3
Sample
Orden Roch-CVE6422-TVOP.xlam
Resource
win10v2004-20230915-en
Malware Config
Extracted
https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937
https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
X29*xphFQf?h - Email To:
[email protected]
Targets
-
-
Target
Orden Roch-CVE6422-TVOP.xlam
-
Size
666KB
-
MD5
5edda4e170c74a69835e8bd822c51803
-
SHA1
daf25f4e5eff37fe7677ce3139b0042a3ec5e236
-
SHA256
0b8fa64ce20b4cedd71c6e36261052f0ac8948ea296c6ada5791c90d563c7e6a
-
SHA512
b254db2d0d3c23490334df11c368d3bf6c8b4647bd1c4ea5e413bef5e8d9e6aa6cb2b936bb59b85b3767d9630fed389edc30ed2b5bfc13402b22b6f0a1587fe8
-
SSDEEP
12288:WTaUMotvoZmtEEPnBu4fYbHI4LXP+FEXpH1YUyKgOm9oQbvs6:/UNEsnBu4fgIm+FiVYUyKgl9oQTN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-