General
-
Target
RFQ.xls
-
Size
317KB
-
Sample
240311-qyjrmagb63
-
MD5
5a54c634aafe8f429437854c349f0d53
-
SHA1
561859535231c8d09b33fcea4485829db1e96c7d
-
SHA256
403cba077fb06d93f68158de86d15d1dcd3d51e5bf7b7457bfdce5c13c1c07ab
-
SHA512
ab6193366cd9134820462bc69a2eb3f632ed8f8c7fb32587d54caed572cf671c119a873f2b921efc5bc7f883258bad9aa92395bf99f6dc5bad33434ee6d9bf53
-
SSDEEP
6144:HsunJ2oY35qAOJl/YrLYz+WrNhZF+E+fgL+0dD8ivSbVyGMIvzUwDNOQ46862f7L:HlJ2l3bVyGMIvgwZOQoJuIAm
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.xls
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
RFQ.xls
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
jCXzqcP1 daniel 3116 - Email To:
[email protected]
Targets
-
-
Target
RFQ.xls
-
Size
317KB
-
MD5
5a54c634aafe8f429437854c349f0d53
-
SHA1
561859535231c8d09b33fcea4485829db1e96c7d
-
SHA256
403cba077fb06d93f68158de86d15d1dcd3d51e5bf7b7457bfdce5c13c1c07ab
-
SHA512
ab6193366cd9134820462bc69a2eb3f632ed8f8c7fb32587d54caed572cf671c119a873f2b921efc5bc7f883258bad9aa92395bf99f6dc5bad33434ee6d9bf53
-
SSDEEP
6144:HsunJ2oY35qAOJl/YrLYz+WrNhZF+E+fgL+0dD8ivSbVyGMIvzUwDNOQ46862f7L:HlJ2l3bVyGMIvgwZOQoJuIAm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Abuses OpenXML format to download file from external location
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-