General
-
Target
Quotation Sample_398893.xlsx
-
Size
1.0MB
-
Sample
241010-kpe47asdjg
-
MD5
1fa0c01f5ce39c3040b272cc0178b526
-
SHA1
7dcc0072cda211e5af3e025335398691736f7c7d
-
SHA256
b33d9e331c5b5e6a463d3be8b0456156459983fa4889009e9ba23e355f8548e5
-
SHA512
2c686ad61500d70ebeeddc04b26bcb6301877960c2dd03fcc4f82dc8344607ee04b33cf06ab9e63e160393a407a5385991cac5ccbfe5d35b6535705bb075bc49
-
SSDEEP
24576:DsP8ORmk0aZyMRIithugFmoXo0Jf4rkL7cd1AQIRL:DW8ORlZdthugFD4rPLA9
Static task
static1
Behavioral task
behavioral1
Sample
Quotation Sample_398893.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Quotation Sample_398893.xlsx
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.hermosanairobi.com - Port:
587 - Username:
[email protected] - Password:
+efQ)lDLJF7899 - Email To:
[email protected]
Targets
-
-
Target
Quotation Sample_398893.xlsx
-
Size
1.0MB
-
MD5
1fa0c01f5ce39c3040b272cc0178b526
-
SHA1
7dcc0072cda211e5af3e025335398691736f7c7d
-
SHA256
b33d9e331c5b5e6a463d3be8b0456156459983fa4889009e9ba23e355f8548e5
-
SHA512
2c686ad61500d70ebeeddc04b26bcb6301877960c2dd03fcc4f82dc8344607ee04b33cf06ab9e63e160393a407a5385991cac5ccbfe5d35b6535705bb075bc49
-
SSDEEP
24576:DsP8ORmk0aZyMRIithugFmoXo0Jf4rkL7cd1AQIRL:DW8ORlZdthugFD4rPLA9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Exploitation for Client Execution
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1