General
-
Target
gunzipped.xls
-
Size
391KB
-
Sample
231128-hwzq3agb4s
-
MD5
2ac8a298c47d91f127ff8951e5e00fd4
-
SHA1
bf41a1fb5658b33d886ddc20b7d424c6dbd91d15
-
SHA256
49cbd743a040465d6757e0e5d408d674624053368967940cd8c51ac97925bfc8
-
SHA512
856988af820bd0a102b4b917e2c66840d6c8f41f5adc45f21df11ccf95061ff8476fbc98a1a069a8d514f2ad903b1ace95d74e8781149c994df772b1b3a7494c
-
SSDEEP
6144:Zn1m9kdbk71u+FZetJs0hdMJUXWDYWBXVH11IyqyLuJvsEKEY6Uvo:ZOee1CtqSdLWDYMZ1SFPsETYPvo
Static task
static1
Behavioral task
behavioral1
Sample
gunzipped.xls
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
gunzipped.xls
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.acc-engineering.xyz - Port:
21 - Username:
[email protected] - Password:
chinonsonkechi22#
Targets
-
-
Target
gunzipped.xls
-
Size
391KB
-
MD5
2ac8a298c47d91f127ff8951e5e00fd4
-
SHA1
bf41a1fb5658b33d886ddc20b7d424c6dbd91d15
-
SHA256
49cbd743a040465d6757e0e5d408d674624053368967940cd8c51ac97925bfc8
-
SHA512
856988af820bd0a102b4b917e2c66840d6c8f41f5adc45f21df11ccf95061ff8476fbc98a1a069a8d514f2ad903b1ace95d74e8781149c994df772b1b3a7494c
-
SSDEEP
6144:Zn1m9kdbk71u+FZetJs0hdMJUXWDYWBXVH11IyqyLuJvsEKEY6Uvo:ZOee1CtqSdLWDYMZ1SFPsETYPvo
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Abuses OpenXML format to download file from external location
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-