General
-
Target
Item list.doc
-
Size
99KB
-
Sample
231011-hvxkbagh3z
-
MD5
0110034c3a13e96317d374e3eceddf44
-
SHA1
67f631c83a5edb57cc1719dded70585b7b6392bc
-
SHA256
bdd586a33bfd9b732e20e49628e827a510a322f3a9df7edee7d8e631c510611a
-
SHA512
a94a25e9f55fa7d12051582030ef8984366eeadb332441bfb4528d8346208d8a4aeb1478c7dd6826e2138c8da33141dc2f8fd21ec80e444e54746282d062df55
-
SSDEEP
768:iC7Wq0BiIsxPpwkWfYjugztCUlkXba1C/9wZdEHPigencKCCe1OK/:iC6q0BnpP4ugzxEigeVewW
Static task
static1
Behavioral task
behavioral1
Sample
Item list.rtf
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Item list.rtf
Resource
win10v2004-20230915-en
Malware Config
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
Item list.doc
-
Size
99KB
-
MD5
0110034c3a13e96317d374e3eceddf44
-
SHA1
67f631c83a5edb57cc1719dded70585b7b6392bc
-
SHA256
bdd586a33bfd9b732e20e49628e827a510a322f3a9df7edee7d8e631c510611a
-
SHA512
a94a25e9f55fa7d12051582030ef8984366eeadb332441bfb4528d8346208d8a4aeb1478c7dd6826e2138c8da33141dc2f8fd21ec80e444e54746282d062df55
-
SSDEEP
768:iC7Wq0BiIsxPpwkWfYjugztCUlkXba1C/9wZdEHPigencKCCe1OK/:iC6q0BnpP4ugzxEigeVewW
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-