General
-
Target
Factura.xlsx
-
Size
3.9MB
-
Sample
240919-htsjzawgkk
-
MD5
5ffc2a72ff05e1f486e4aa0142b89a23
-
SHA1
1d7428dd31e095b0aa43a61c962e7d42587c3f0c
-
SHA256
0f626eca4a80a70619bded3da7db0cbac8de8effb65482cdf05962ff789155be
-
SHA512
3b9753133f33901cc5fe4cc9e13ddb860b6a4cbae572ba4aad0149589c4b162caa9352dc57831d9c532367e5f978e22de34612566990fd0e83aaba4797cec7d4
-
SSDEEP
98304:fxCNiZcsxN2HwHTiOsR1PWdVUnugvD50Dm:ZC8ZcsiOPdEugvDV
Static task
static1
Behavioral task
behavioral1
Sample
Factura.xlsx
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Factura.xlsx
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.solucionesmexico.mx - Port:
587 - Username:
[email protected] - Password:
Qdk,[nKrmI0j - Email To:
[email protected]
Targets
-
-
Target
Factura.xlsx
-
Size
3.9MB
-
MD5
5ffc2a72ff05e1f486e4aa0142b89a23
-
SHA1
1d7428dd31e095b0aa43a61c962e7d42587c3f0c
-
SHA256
0f626eca4a80a70619bded3da7db0cbac8de8effb65482cdf05962ff789155be
-
SHA512
3b9753133f33901cc5fe4cc9e13ddb860b6a4cbae572ba4aad0149589c4b162caa9352dc57831d9c532367e5f978e22de34612566990fd0e83aaba4797cec7d4
-
SSDEEP
98304:fxCNiZcsxN2HwHTiOsR1PWdVUnugvD50Dm:ZC8ZcsiOPdEugvDV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-