General
-
Target
file01.ps1
-
Size
833KB
-
Sample
220930-3sa9hsfbc5
-
MD5
3cc5a223552109e539cbe5ef1fa5e5fe
-
SHA1
73ae5666483ca262a772ff39a4ca867290934054
-
SHA256
085d23a18c1dc923aaaa53ead881862faadaf2cd49114fe2ea5d85a3d7d5a9f3
-
SHA512
3e6be56204400bd1535c655208ad881f01f038ab345aceac8a692f4d59f0d951ed923bd76d598c07f0d5ae7d6a24e984eafaafe68b9b20755cdc160b5e93ff1e
-
SSDEEP
12288:vX4HnACkasep8iiShRNiXPCkwT0AV4igtsfsZTMursfV5yqhrzcJMrqLtPw5Cc/D:vXe7
Static task
static1
Behavioral task
behavioral1
Sample
file01.ps1
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file01.ps1
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
file01.ps1
-
Size
833KB
-
MD5
3cc5a223552109e539cbe5ef1fa5e5fe
-
SHA1
73ae5666483ca262a772ff39a4ca867290934054
-
SHA256
085d23a18c1dc923aaaa53ead881862faadaf2cd49114fe2ea5d85a3d7d5a9f3
-
SHA512
3e6be56204400bd1535c655208ad881f01f038ab345aceac8a692f4d59f0d951ed923bd76d598c07f0d5ae7d6a24e984eafaafe68b9b20755cdc160b5e93ff1e
-
SSDEEP
12288:vX4HnACkasep8iiShRNiXPCkwT0AV4igtsfsZTMursfV5yqhrzcJMrqLtPw5Cc/D:vXe7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Registers COM server for autorun
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-