General
-
Target
0fcd3484d291bf5d9ac474cdc0fb448d8bb61e63beb87201d9b3bf6c4d96cf4b
-
Size
1.3MB
-
Sample
220604-rsy5ssbba7
-
MD5
e11a22c0d8fdac1626d1a94866906cd9
-
SHA1
95a56cfb56a8704ba8533321a4c56c846ed3431c
-
SHA256
0fcd3484d291bf5d9ac474cdc0fb448d8bb61e63beb87201d9b3bf6c4d96cf4b
-
SHA512
0d570f48f7ad28ebe0c444a72e63dd200b9883ae0704b3571b98fe4e2962489751b1395bc670e1e04f68ceb92eb9bf5f6284c89a67449c69843efd56bdbc31f3
Static task
static1
Behavioral task
behavioral1
Sample
0fcd3484d291bf5d9ac474cdc0fb448d8bb61e63beb87201d9b3bf6c4d96cf4b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0fcd3484d291bf5d9ac474cdc0fb448d8bb61e63beb87201d9b3bf6c4d96cf4b.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
0fcd3484d291bf5d9ac474cdc0fb448d8bb61e63beb87201d9b3bf6c4d96cf4b
-
Size
1.3MB
-
MD5
e11a22c0d8fdac1626d1a94866906cd9
-
SHA1
95a56cfb56a8704ba8533321a4c56c846ed3431c
-
SHA256
0fcd3484d291bf5d9ac474cdc0fb448d8bb61e63beb87201d9b3bf6c4d96cf4b
-
SHA512
0d570f48f7ad28ebe0c444a72e63dd200b9883ae0704b3571b98fe4e2962489751b1395bc670e1e04f68ceb92eb9bf5f6284c89a67449c69843efd56bdbc31f3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
AgentTesla Payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-