General
-
Target
1ccd3e2580b4e0de27bfeae3a92d638230c573704c66a06a0e11018224d176a0
-
Size
420KB
-
Sample
240514-bvbjhsdf2y
-
MD5
65ae45789b58f1e03a4f8c3f178e6b30
-
SHA1
4eb87b3825da0d23d7f7091c2976e1e95cc40907
-
SHA256
1ccd3e2580b4e0de27bfeae3a92d638230c573704c66a06a0e11018224d176a0
-
SHA512
6d7da073e7280bf84612920a6371b19a1226fa50747587dbfe9fe10ed6bdf514ab8b171605d34a0a090d5f9ee3dbe4ec5e6fa379a73dc4675c8f4e46e359e864
-
SSDEEP
6144:NZ+RwPONXoRjDhIcp0fDlavx+W26nAHu8uniSHBMixiMK6G+ZFrTUvCp4sJgpQMD:31iQpozwjTqCfgdhd/+Z4uCz2BFmDiP
Static task
static1
Behavioral task
behavioral1
Sample
1ccd3e2580b4e0de27bfeae3a92d638230c573704c66a06a0e11018224d176a0.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1ccd3e2580b4e0de27bfeae3a92d638230c573704c66a06a0e11018224d176a0.xls
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.officeemailbackup.com - Port:
587 - Username:
[email protected] - Password:
)o!yHrsuTG#e - Email To:
[email protected]
Targets
-
-
Target
1ccd3e2580b4e0de27bfeae3a92d638230c573704c66a06a0e11018224d176a0
-
Size
420KB
-
MD5
65ae45789b58f1e03a4f8c3f178e6b30
-
SHA1
4eb87b3825da0d23d7f7091c2976e1e95cc40907
-
SHA256
1ccd3e2580b4e0de27bfeae3a92d638230c573704c66a06a0e11018224d176a0
-
SHA512
6d7da073e7280bf84612920a6371b19a1226fa50747587dbfe9fe10ed6bdf514ab8b171605d34a0a090d5f9ee3dbe4ec5e6fa379a73dc4675c8f4e46e359e864
-
SSDEEP
6144:NZ+RwPONXoRjDhIcp0fDlavx+W26nAHu8uniSHBMixiMK6G+ZFrTUvCp4sJgpQMD:31iQpozwjTqCfgdhd/+Z4uCz2BFmDiP
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Abuses OpenXML format to download file from external location
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-