General
-
Target
New Order POREF9089056.xlam
-
Size
582KB
-
Sample
231211-1wrdssaaem
-
MD5
49738439bcfcfc5004baa26882cac103
-
SHA1
c0bce9d61a737f73447ac5cd5790f2912664813a
-
SHA256
e3c5829c621c6eae33c20f6744acdec9671779ca8e9ec555052638aa2577a587
-
SHA512
352e740314843484c314bf94cdffa987bbba57b1564a5722f4e5d1074f344a17b298c40a384f6aa40c4690650f9116acea73e9c792e0e17100b9501707db93a8
-
SSDEEP
12288:IRFQqU2NWQVENBwXsQ5s1jp1Wy2jd23qAleDVyVMK:qpuuP5s1OPjdeqnkVB
Static task
static1
Behavioral task
behavioral1
Sample
New Order POREF9089056.xlam
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
New Order POREF9089056.xlam
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
rwe87$%21q - Email To:
[email protected]
Targets
-
-
Target
New Order POREF9089056.xlam
-
Size
582KB
-
MD5
49738439bcfcfc5004baa26882cac103
-
SHA1
c0bce9d61a737f73447ac5cd5790f2912664813a
-
SHA256
e3c5829c621c6eae33c20f6744acdec9671779ca8e9ec555052638aa2577a587
-
SHA512
352e740314843484c314bf94cdffa987bbba57b1564a5722f4e5d1074f344a17b298c40a384f6aa40c4690650f9116acea73e9c792e0e17100b9501707db93a8
-
SSDEEP
12288:IRFQqU2NWQVENBwXsQ5s1jp1Wy2jd23qAleDVyVMK:qpuuP5s1OPjdeqnkVB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-