General
-
Target
document1.xlsxm.exe
-
Size
2.7MB
-
Sample
240508-zz56paab78
-
MD5
8ea414e3fc128a558afaa3a999388a0b
-
SHA1
ad69e47a3f5593ffff68a4520616bac11f16281a
-
SHA256
d6c1ee38b67f85751a95b4179a6ffc0db013abccff70d21c1161c27b8ce610d1
-
SHA512
d854bb2ee3f3ad90253c751cd91397b6f68776fb5261298c09c80f372ab832ede0f93f08225365e7c93be00280d37b1576ed4c4ccaad4f0d89d43e1bb9b2ca7f
-
SSDEEP
49152:5auTBb8/eJr0r/psmftWhXnI5MlaAXr0ve1Epb7wqkR2f+PC7BDWmLC:sOKRsxhXnyAo2Cp4qkRiR1
Static task
static1
Behavioral task
behavioral1
Sample
document1.xlsxm.exe
Resource
win7-20240508-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.id-net.fr - Port:
587 - Username:
[email protected] - Password:
zhi33
Extracted
agenttesla
Protocol: smtp- Host:
mail.id-net.fr - Port:
587 - Username:
[email protected] - Password:
zhi33 - Email To:
[email protected]
Targets
-
-
Target
document1.xlsxm.exe
-
Size
2.7MB
-
MD5
8ea414e3fc128a558afaa3a999388a0b
-
SHA1
ad69e47a3f5593ffff68a4520616bac11f16281a
-
SHA256
d6c1ee38b67f85751a95b4179a6ffc0db013abccff70d21c1161c27b8ce610d1
-
SHA512
d854bb2ee3f3ad90253c751cd91397b6f68776fb5261298c09c80f372ab832ede0f93f08225365e7c93be00280d37b1576ed4c4ccaad4f0d89d43e1bb9b2ca7f
-
SSDEEP
49152:5auTBb8/eJr0r/psmftWhXnI5MlaAXr0ve1Epb7wqkR2f+PC7BDWmLC:sOKRsxhXnyAo2Cp4qkRiR1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-