General
-
Target
01092024_0051_30082024_PO-5490845-4S8068290.xlam
-
Size
682KB
-
Sample
240901-a7w6bavfrk
-
MD5
76c282413a8c6edbf4a47919562a01ca
-
SHA1
7d7438892ef62c343b1b1740366ec7f60b600bf9
-
SHA256
e07d367746bd1758ff371cafef3dca07c54658c56c44597e425b9a95e8baf87a
-
SHA512
844b59bed86aa7d40cc306b3af5f0d3cf4207ac5f7cb074d4ef4c21da992530d02e103535595caa5d2ef5fe1dfc30c86ff6b9ead9ffbb136495ea9b35f24675e
-
SSDEEP
12288:h0Vb6zt3J9Lsd3/BxXXsmSGQ0TkHsJ5T+fVtXx4c7KL6cA39hkg:yVb6zRJ9Lsd3bXXXkMJ5T+fbXKc7Y6xH
Static task
static1
Behavioral task
behavioral1
Sample
01092024_0051_30082024_PO-5490845-4S8068290.xlam
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
01092024_0051_30082024_PO-5490845-4S8068290.xlam
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
cy+G_(979n9N - Email To:
[email protected]
Targets
-
-
Target
01092024_0051_30082024_PO-5490845-4S8068290.xlam
-
Size
682KB
-
MD5
76c282413a8c6edbf4a47919562a01ca
-
SHA1
7d7438892ef62c343b1b1740366ec7f60b600bf9
-
SHA256
e07d367746bd1758ff371cafef3dca07c54658c56c44597e425b9a95e8baf87a
-
SHA512
844b59bed86aa7d40cc306b3af5f0d3cf4207ac5f7cb074d4ef4c21da992530d02e103535595caa5d2ef5fe1dfc30c86ff6b9ead9ffbb136495ea9b35f24675e
-
SSDEEP
12288:h0Vb6zt3J9Lsd3/BxXXsmSGQ0TkHsJ5T+fVtXx4c7KL6cA39hkg:yVb6zRJ9Lsd3bXXXkMJ5T+fbXKc7Y6xH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-