General
-
Target
CA-OP2402406.xla
-
Size
34KB
-
Sample
240319-qkbtvsdg4z
-
MD5
ac5961d86e95721920bbaa055049a2f6
-
SHA1
9db4e33efb83d9029e737d7105c6a16d0ff763a3
-
SHA256
c47b5b5e01d11e26d7bf7b4c23ee682fabc71db90be27da4e69f3c5045dd7bef
-
SHA512
dc9621a454180c5246eab427d26ef25119bc64cba51103dc8d848b7e9d7c0011da7a87585239cf33e5987e7dcf43f4410d9fee1ff5f54c29c9d10a086e79c131
-
SSDEEP
384:D1rexSDrIw6OeA+qpUpWrpEgDhvC4w8zLtCEcNTbHfFCF375JDOJJMUXZ:DIWsOe1G/DML83tC5l/cbDOJJM6Z
Static task
static1
Behavioral task
behavioral1
Sample
CA-OP2402406.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CA-OP2402406.xls
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.folder.ro - Port:
21 - Username:
[email protected] - Password:
xgkFQ6fqqo}J
Targets
-
-
Target
CA-OP2402406.xla
-
Size
34KB
-
MD5
ac5961d86e95721920bbaa055049a2f6
-
SHA1
9db4e33efb83d9029e737d7105c6a16d0ff763a3
-
SHA256
c47b5b5e01d11e26d7bf7b4c23ee682fabc71db90be27da4e69f3c5045dd7bef
-
SHA512
dc9621a454180c5246eab427d26ef25119bc64cba51103dc8d848b7e9d7c0011da7a87585239cf33e5987e7dcf43f4410d9fee1ff5f54c29c9d10a086e79c131
-
SSDEEP
384:D1rexSDrIw6OeA+qpUpWrpEgDhvC4w8zLtCEcNTbHfFCF375JDOJJMUXZ:DIWsOe1G/DML83tC5l/cbDOJJM6Z
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Abuses OpenXML format to download file from external location
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-