General
-
Target
7931c850bdda4b2d1de759d7c39e7bdb34fee5bfd1e829bf278a443a756078a3
-
Size
673KB
-
Sample
191025-myxerjbgfx
-
MD5
b4adbbe65ad0f10a5ec66d85306f0667
-
SHA1
1f399aaf5fdd46fa523800413666e133aceb3b29
-
SHA256
7931c850bdda4b2d1de759d7c39e7bdb34fee5bfd1e829bf278a443a756078a3
-
SHA512
5fe3edab58ca38f351c326bbde983bcafefc98f254bfc10386eb12b51821b5aa116b805f887be4fc644838d061742012b04b7883275f6e5f48c39a1a3e8f0724
Task
task1
Sample
7931c850bdda4b2d1de759d7c39e7bdb34fee5bfd1e829bf278a443a756078a3.exe
Resource
win7v191014
Task
task2
Sample
7931c850bdda4b2d1de759d7c39e7bdb34fee5bfd1e829bf278a443a756078a3.exe
Resource
win10v191014
Malware Config
Targets
-
-
Target
7931c850bdda4b2d1de759d7c39e7bdb34fee5bfd1e829bf278a443a756078a3
-
Size
673KB
-
MD5
b4adbbe65ad0f10a5ec66d85306f0667
-
SHA1
1f399aaf5fdd46fa523800413666e133aceb3b29
-
SHA256
7931c850bdda4b2d1de759d7c39e7bdb34fee5bfd1e829bf278a443a756078a3
-
SHA512
5fe3edab58ca38f351c326bbde983bcafefc98f254bfc10386eb12b51821b5aa116b805f887be4fc644838d061742012b04b7883275f6e5f48c39a1a3e8f0724
Score10/10-
agenttesla family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run entry to start application
-
Checks system information in the registry (likely anti-VM)
-
Modifies service
-
Suspicious use of SetThreadContext
-