General
-
Target
a126d8e25e0d57c17c815713b389ee34.rtf
-
Size
69KB
-
Sample
240313-phra4aee56
-
MD5
a126d8e25e0d57c17c815713b389ee34
-
SHA1
f879369a4da547c9778025ebeba3b58e28372f8e
-
SHA256
ee5c4b17cd1da34f6ad2d47de7bf8fad000705086c34243cc0d36a15e1dfb903
-
SHA512
ee2004b2b04ba22010fcd2324e381a693d7add4e171513d132b71896e088bf1c21319591be316b695e349ac22dbd96f0e5e792ba1c536d1ace6938f677099c7d
-
SSDEEP
1536:LBJJZKass8qvfQ6v1iEyLj8IjWCsO+WAZaLWWu19TO2jw:LBjZ5sXI10j8SWCr+5aBu19TOqw
Static task
static1
Behavioral task
behavioral1
Sample
a126d8e25e0d57c17c815713b389ee34.rtf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a126d8e25e0d57c17c815713b389ee34.rtf
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.kabeercommodities.com - Port:
587 - Username:
[email protected] - Password:
w{A6H.o&sz%g - Email To:
[email protected]
Targets
-
-
Target
a126d8e25e0d57c17c815713b389ee34.rtf
-
Size
69KB
-
MD5
a126d8e25e0d57c17c815713b389ee34
-
SHA1
f879369a4da547c9778025ebeba3b58e28372f8e
-
SHA256
ee5c4b17cd1da34f6ad2d47de7bf8fad000705086c34243cc0d36a15e1dfb903
-
SHA512
ee2004b2b04ba22010fcd2324e381a693d7add4e171513d132b71896e088bf1c21319591be316b695e349ac22dbd96f0e5e792ba1c536d1ace6938f677099c7d
-
SSDEEP
1536:LBJJZKass8qvfQ6v1iEyLj8IjWCsO+WAZaLWWu19TO2jw:LBjZ5sXI10j8SWCr+5aBu19TOqw
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-