General
-
Target
QUOTATION.docx.doc
-
Size
295KB
-
Sample
240508-jqdr3sab9y
-
MD5
8feb6e9bf1782987b2d83aa5a39ae5d8
-
SHA1
49b44a52ab776e48377c6d56a4d7b09f717ae555
-
SHA256
7ccfa149c82865c7bef38d83a3cfe955fcbe8aad03a61c05b3281b1a9dd2e858
-
SHA512
965c11aabf49e32de333d2b2c76928c74146305174f33bc82bd59f9408800f994cfa5e987fb46122ac7970203de799bb83ee70afadc60aa9bc985476aecbceea
-
SSDEEP
6144:WGK/46IXgfuFO6S951ndPJ8fUeuCf9fLhCMG8f/W/:WGKgwfu4h1dPifUeuCf9fFZpfs
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION.docx
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
QUOTATION.docx
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6981982105:AAGJZG7U4ELI-QLExHS4a6AlsLp__P5_opc/
Targets
-
-
Target
QUOTATION.docx.doc
-
Size
295KB
-
MD5
8feb6e9bf1782987b2d83aa5a39ae5d8
-
SHA1
49b44a52ab776e48377c6d56a4d7b09f717ae555
-
SHA256
7ccfa149c82865c7bef38d83a3cfe955fcbe8aad03a61c05b3281b1a9dd2e858
-
SHA512
965c11aabf49e32de333d2b2c76928c74146305174f33bc82bd59f9408800f994cfa5e987fb46122ac7970203de799bb83ee70afadc60aa9bc985476aecbceea
-
SSDEEP
6144:WGK/46IXgfuFO6S951ndPJ8fUeuCf9fLhCMG8f/W/:WGKgwfu4h1dPifUeuCf9fFZpfs
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Abuses OpenXML format to download file from external location
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-