General
-
Target
Inquiry N TM24-10-09.xlam.xlsx
-
Size
803KB
-
Sample
241010-h8ypja1dje
-
MD5
c4d3d1b1842e510619920b9492900250
-
SHA1
25749eb1073ce81fd72314dda9efab61adb70b3f
-
SHA256
f8fb6c4ac020b9b8116781833ad5f536979a2e21986601c55928a2bfcc3036ce
-
SHA512
dd3c9e5590f43fa891142106169a90d2ec986f3db45a641d38c4af326ac7b600eb9442b4fca0b0fd3f096b547cce6162535bbc67d6fe534e1f7c3c44d4d72919
-
SSDEEP
12288:5UDmtDq7MeSQA4rwbZswK/j+c61E/y7CEBbJlFE54zuvBBhvWHK0QbJXaw71DrGb:WDf4lYrwzKrV6S/yBruv/hHxbdD1Drub
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry N TM24-10-09.xlam
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Inquiry N TM24-10-09.xlam
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
ORKSEMuW*kNA - Email To:
[email protected]
Targets
-
-
Target
Inquiry N TM24-10-09.xlam.xlsx
-
Size
803KB
-
MD5
c4d3d1b1842e510619920b9492900250
-
SHA1
25749eb1073ce81fd72314dda9efab61adb70b3f
-
SHA256
f8fb6c4ac020b9b8116781833ad5f536979a2e21986601c55928a2bfcc3036ce
-
SHA512
dd3c9e5590f43fa891142106169a90d2ec986f3db45a641d38c4af326ac7b600eb9442b4fca0b0fd3f096b547cce6162535bbc67d6fe534e1f7c3c44d4d72919
-
SSDEEP
12288:5UDmtDq7MeSQA4rwbZswK/j+c61E/y7CEBbJlFE54zuvBBhvWHK0QbJXaw71DrGb:WDf4lYrwzKrV6S/yBruv/hHxbdD1Drub
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-