General
-
Target
Order Specifications for Materials.docx.zip
-
Size
728KB
-
Sample
250403-kjzlmss1gz
-
MD5
2f7aae575e8c708cb3b60d76ff100fbc
-
SHA1
98563e093af8bf16c0b7e4d0423fe2e29fff3a58
-
SHA256
40442f4743cde43b92eb15a70e03456569ebaf92299f74dc7c62cbb9de307dc2
-
SHA512
b2494b1c4a539af6d7a73133bc33d472e2e3c53177ec1bcde4b2f0cd534d873950af8306608cd1c436175f76502fb43089d6d1162adadb1e64d71dc51e37656c
-
SSDEEP
12288:jBQbFkzL1mghjVP4TKC3RBPvHxWiZGsSYtmohfJNWh2jBNjBxLUmouZGAx4h7BA:jBQbsFHwuC3RZPAiZ+/kBrxgmoZAmh7C
Static task
static1
Behavioral task
behavioral1
Sample
Order Specifications for Materials.docx.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.haliza.com.my - Port:
21 - Username:
[email protected] - Password:
JesusChrist007$
Targets
-
-
Target
Order Specifications for Materials.docx.exe
-
Size
1.1MB
-
MD5
ca5e9b87e7c8b8dc2b60edad5b0ef4d5
-
SHA1
be210e5855b7ac8337da25bea95117fdd66be619
-
SHA256
1a326608fcf76eabbcc227a1515eb23309a8e6adb6c18b2c23041e3ebf225c77
-
SHA512
4b460524f7d9834ba089de468783df9761342de4b06255fc3bb11a4907f6eb21f0529c8ad250989d3494437f4839dc355907fd023840eb842c21be9b35d6f1bd
-
SSDEEP
24576:eu6J33O0c+JY5UZ+XC0kGso6Fa1M+Tlxkm4ZugpWY:wu0c++OCvkGs9Fa1MQlxyupY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-