General
-
Target
2.docx
-
Size
16KB
-
Sample
231127-n7wfnsgd47
-
MD5
74a1be4072cdff7d23292d65ad2112a3
-
SHA1
2df97ec0e50130b764d5b777a328da4ce5ba49d9
-
SHA256
5ce58c49f5abc817c193a24964f2abb75db9caafe37d3901cba27cadb872e0a8
-
SHA512
0fea42e33b8a3e3c56a1a0b570f3f087c901e1e5e4a6a93b34610bfe4c07808bb0cbab6ee543192cf21189f57b823edf01112812fec6b791005333e0ab475287
-
SSDEEP
384:uyXfh2hWqs8PL8wi4OEwH8TIbE91r2fRaJYdviiHI5//r:ucfKR5P3DOqnYJEMvXHI5/T
Static task
static1
Behavioral task
behavioral1
Sample
2.docx
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2.docx
Resource
win10v2004-20231025-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.royalwealth.space - Port:
587 - Username:
[email protected] - Password:
sQxM4AdAZ5kY7As - Email To:
[email protected]
Targets
-
-
Target
2.docx
-
Size
16KB
-
MD5
74a1be4072cdff7d23292d65ad2112a3
-
SHA1
2df97ec0e50130b764d5b777a328da4ce5ba49d9
-
SHA256
5ce58c49f5abc817c193a24964f2abb75db9caafe37d3901cba27cadb872e0a8
-
SHA512
0fea42e33b8a3e3c56a1a0b570f3f087c901e1e5e4a6a93b34610bfe4c07808bb0cbab6ee543192cf21189f57b823edf01112812fec6b791005333e0ab475287
-
SSDEEP
384:uyXfh2hWqs8PL8wi4OEwH8TIbE91r2fRaJYdviiHI5//r:ucfKR5P3DOqnYJEMvXHI5/T
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Abuses OpenXML format to download file from external location
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-