General
-
Target
Προσφορά.doc
-
Size
171KB
-
Sample
231209-vjqnvahfaq
-
MD5
89b53168791254c2607152a98f36f82d
-
SHA1
ce568d6a989b016dc0cdb4417e899441ffb30249
-
SHA256
9feb3776b218c36c46e76c896356aeae822e19c4c1caf5814c625d1a48b7fece
-
SHA512
5ca27f17cdb917989a900aec3e494db8e02d86158d92ad109034b3f4e1a01e88aaeef8dc4c7fd732a980737c8acc69f0149d5ec6b7f3f3ae4e1d141f0dff1477
-
SSDEEP
768:swAbZSibMX9gRWjtwAbZSibMX9gRWjM6MvWrLJqnqg1s:swAlRkwAlRBWrL6qg1s
Static task
static1
Behavioral task
behavioral1
Sample
Προσφορά.rtf
Resource
win7-20231025-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
YAWALESS123@@kkk - Email To:
[email protected]
Targets
-
-
Target
Προσφορά.doc
-
Size
171KB
-
MD5
89b53168791254c2607152a98f36f82d
-
SHA1
ce568d6a989b016dc0cdb4417e899441ffb30249
-
SHA256
9feb3776b218c36c46e76c896356aeae822e19c4c1caf5814c625d1a48b7fece
-
SHA512
5ca27f17cdb917989a900aec3e494db8e02d86158d92ad109034b3f4e1a01e88aaeef8dc4c7fd732a980737c8acc69f0149d5ec6b7f3f3ae4e1d141f0dff1477
-
SSDEEP
768:swAbZSibMX9gRWjtwAbZSibMX9gRWjM6MvWrLJqnqg1s:swAlRkwAlRBWrL6qg1s
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-