General
-
Target
14102024_1645_11102024_εκκαθάριση τιμολογίου για πληρωμή 11 Οκτωβρίου 2024 xlsx.z
-
Size
694KB
-
Sample
241014-t9l8nsygqp
-
MD5
31e9a8fb8939bb86e7861b59061d7e09
-
SHA1
019f7f54f3cf86b12ab2f513d5577007118f85aa
-
SHA256
a2aca0074f33821237e5cad0cf5a8c1f5951e8e43464b47846c335e369f41196
-
SHA512
4b5dd349cc5779da1d2953c1d852163d3262e5f97cb2a5be1b6b949b5a3b0cd7c107bf6019a436dd4df3a47bdd2088dd8607cda26aae9b5426bd3e16046f17c7
-
SSDEEP
12288:dSRFiA+/tvhD/s10BO5N2sdX567MeUYfLjaShi+76QUN9lae8U5:dSDifw1qQEYIj9Bhi+mf9Me84
Static task
static1
Behavioral task
behavioral1
Sample
εκκαθάριση τιμολογίου για πληρωμή 11 Οκτωβρίου 2024.xlsx.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.lavli.rs - Port:
587 - Username:
[email protected] - Password:
lavlirsinfo2010 - Email To:
[email protected]
Targets
-
-
Target
εκκαθάριση τιμολογίου για πληρωμή 11 Οκτωβρίου 2024.xlsx.exe
-
Size
915KB
-
MD5
8c86b902a30a85acd4c2074d74751730
-
SHA1
5a68c4ed0a0794f4f2eb89c495871a3a37eb4470
-
SHA256
5b3b3df47d5e857dae3b9c6fb4b7f03b85f58744d50007a42cc0c5769a9cf59d
-
SHA512
8740908a26e07f80b09f08a39608073064974c5bd73d8c826fe37520a63f9ace0fa30abb99b4b3ec0424f434839855c1e7b130101974747a13b4b5dcbd340700
-
SSDEEP
24576:WtNwSIOU6QJKm4+a1qalkdvf6mNdxFmNxwZpzji:WtySO67PqaEvd1pzG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-