General
-
Target
PI-90349003421.xlsx
-
Size
1.5MB
-
Sample
241017-jhh2tsxhmc
-
MD5
9a809e0f1d435948eacdf1f0fb8b8316
-
SHA1
aea62b0466c64967303de73085f16f40018cd44e
-
SHA256
d52b8e527ad35f54de8e65b0d7c324a9c1afddcd0d09e4d20ea0cb7c8b327394
-
SHA512
15630f6cf033f1c1fd43044c96ffe5b36593c56c9abc6d4b77d3c70b76c5ba73a1ecba679986b7e102c18b521067fc351e519102b8e74f4354babff0aac31697
-
SSDEEP
24576:uVuRVKY8KpiARLlSRqqCfboz6Ga73J1Tkiv9jnQIesN7Vsj5j8m4beb9I:DRYipb0Rq5f06G8PVv9jnMsNOVomFW
Static task
static1
Behavioral task
behavioral1
Sample
PI-90349003421.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PI-90349003421.xlsx
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.hermosanairobi.com - Port:
587 - Username:
[email protected] - Password:
+efQ)lDLJF7899 - Email To:
[email protected]
Targets
-
-
Target
PI-90349003421.xlsx
-
Size
1.5MB
-
MD5
9a809e0f1d435948eacdf1f0fb8b8316
-
SHA1
aea62b0466c64967303de73085f16f40018cd44e
-
SHA256
d52b8e527ad35f54de8e65b0d7c324a9c1afddcd0d09e4d20ea0cb7c8b327394
-
SHA512
15630f6cf033f1c1fd43044c96ffe5b36593c56c9abc6d4b77d3c70b76c5ba73a1ecba679986b7e102c18b521067fc351e519102b8e74f4354babff0aac31697
-
SSDEEP
24576:uVuRVKY8KpiARLlSRqqCfboz6Ga73J1Tkiv9jnQIesN7Vsj5j8m4beb9I:DRYipb0Rq5f06G8PVv9jnMsNOVomFW
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-