General
-
Target
Swift Advice 75,608$ USD.xls
-
Size
279KB
-
Sample
240606-sblc2sgf77
-
MD5
b806f1868f3144102f73f43868d8b031
-
SHA1
cc98fcdd285bb0f935a0593776f6c6182faf7044
-
SHA256
36828e8ba8e39939e864288010d554c1a098a89f414b5ad8b52e97169122630a
-
SHA512
90acc08125ca194c70286fba432f5145e8bead5abb8cff700ac2c5bb954966d3daa29d04a24e91b20000382e60bf5fe5d854e97e366d2cf692f76acf9cb0868b
-
SSDEEP
6144:3qFzL5LIT47HmPWNBjZpXIoVvneEJ28+B3f1S6D+Hx605p:3qFzu4LmPU/rdeo28+Bt7L8p
Static task
static1
Behavioral task
behavioral1
Sample
Swift Advice 75,608$ USD.xls
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Swift Advice 75,608$ USD.xls
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
^NpBYBQ0 - Email To:
[email protected]
Targets
-
-
Target
Swift Advice 75,608$ USD.xls
-
Size
279KB
-
MD5
b806f1868f3144102f73f43868d8b031
-
SHA1
cc98fcdd285bb0f935a0593776f6c6182faf7044
-
SHA256
36828e8ba8e39939e864288010d554c1a098a89f414b5ad8b52e97169122630a
-
SHA512
90acc08125ca194c70286fba432f5145e8bead5abb8cff700ac2c5bb954966d3daa29d04a24e91b20000382e60bf5fe5d854e97e366d2cf692f76acf9cb0868b
-
SSDEEP
6144:3qFzL5LIT47HmPWNBjZpXIoVvneEJ28+B3f1S6D+Hx605p:3qFzu4LmPU/rdeo28+Bt7L8p
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Abuses OpenXML format to download file from external location
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-