General
-
Target
New Order doc.rtf
-
Size
77KB
-
Sample
231012-mqtp3sff59
-
MD5
5f794bed7fe4620ecf5f348acb9c126c
-
SHA1
ab9d0b014eabdfcb46480882bd0390db14d39565
-
SHA256
f40634df7d95e40866241f72fc2f1c36cebe90304662b81fa4332b0c19f81f0a
-
SHA512
4ac0046153db56bb4ef5be26189a097d004ffca0848fd82a03a3d268b8e8ecbb880d62488d0a050f7f88c10b5ea7d01f0fcb8368b9abf35a8927b9755961de97
-
SSDEEP
768:ZwAbZSibMX9gRWj/C0+vqACfHaJniz/y0etRUF5xcDKhSkDEJKbi/:ZwAlRvZvTnizK0B/TSkgJ3
Static task
static1
Behavioral task
behavioral1
Sample
New Order doc.rtf
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
New Order doc.rtf
Resource
win10v2004-20230915-en
Malware Config
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
New Order doc.rtf
-
Size
77KB
-
MD5
5f794bed7fe4620ecf5f348acb9c126c
-
SHA1
ab9d0b014eabdfcb46480882bd0390db14d39565
-
SHA256
f40634df7d95e40866241f72fc2f1c36cebe90304662b81fa4332b0c19f81f0a
-
SHA512
4ac0046153db56bb4ef5be26189a097d004ffca0848fd82a03a3d268b8e8ecbb880d62488d0a050f7f88c10b5ea7d01f0fcb8368b9abf35a8927b9755961de97
-
SSDEEP
768:ZwAbZSibMX9gRWj/C0+vqACfHaJniz/y0etRUF5xcDKhSkDEJKbi/:ZwAlRvZvTnizK0B/TSkgJ3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-