General
-
Target
damaged goods.xlam.xlsx
-
Size
598KB
-
Sample
240513-h8ddlafb77
-
MD5
411e3ea683011310328bb49fa355f79e
-
SHA1
1f274b5cd4400eca6475c9348701dcc21697c647
-
SHA256
60e883a7946bcb606bc4097c1ea808a9de5f0bd71c1db1d1c545c14cc13d19d6
-
SHA512
287b0a2d23d06076908ea6f0ab638187f7eb2929443a6b9c21bae1edb0e2a803c6ed53170eecc8fd814fb61c5ca1fd9d157f02f5a850b334da63227e4a2c45f2
-
SSDEEP
12288:WcnWp+CNHlxAWQYIZnm9V66G8ZhqecI6fyEjm82DyDfEOd8rusX3gPP1v:FohKm9I6GwcQEjm8Vl8SE3gv
Static task
static1
Behavioral task
behavioral1
Sample
damaged goods.xlam
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
damaged goods.xlam
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
damaged goods.xlam.xlsx
-
Size
598KB
-
MD5
411e3ea683011310328bb49fa355f79e
-
SHA1
1f274b5cd4400eca6475c9348701dcc21697c647
-
SHA256
60e883a7946bcb606bc4097c1ea808a9de5f0bd71c1db1d1c545c14cc13d19d6
-
SHA512
287b0a2d23d06076908ea6f0ab638187f7eb2929443a6b9c21bae1edb0e2a803c6ed53170eecc8fd814fb61c5ca1fd9d157f02f5a850b334da63227e4a2c45f2
-
SSDEEP
12288:WcnWp+CNHlxAWQYIZnm9V66G8ZhqecI6fyEjm82DyDfEOd8rusX3gPP1v:FohKm9I6GwcQEjm8Vl8SE3gv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-