General
-
Target
bad.ppam
-
Size
11KB
-
Sample
211018-mhjj5sdde6
-
MD5
a00323d66feb6d05cb3cfc28ff8c79a9
-
SHA1
50cb3fa623e7a92553512d4b26f797ed23eab0e4
-
SHA256
4fcca1bce2dd80a24a9def40ab28cc5197e8dd477c2ef77c4d47a19b73fa8bf1
-
SHA512
1f2a0f55e62511f2e22c53d814e421f9eafc0d019496a2afd59bde15329a0fb0634bfee6117bd0649c745ceae2b288ea9f28b293dc57ea9a99064a7b06406aeb
Static task
static1
Behavioral task
behavioral1
Sample
bad.ppam
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
bad.ppam
Resource
win10-en-20211014
Malware Config
Targets
-
-
Target
bad.ppam
-
Size
11KB
-
MD5
a00323d66feb6d05cb3cfc28ff8c79a9
-
SHA1
50cb3fa623e7a92553512d4b26f797ed23eab0e4
-
SHA256
4fcca1bce2dd80a24a9def40ab28cc5197e8dd477c2ef77c4d47a19b73fa8bf1
-
SHA512
1f2a0f55e62511f2e22c53d814e421f9eafc0d019496a2afd59bde15329a0fb0634bfee6117bd0649c745ceae2b288ea9f28b293dc57ea9a99064a7b06406aeb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
AgentTesla Payload
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-