General
-
Target
SecuriteInfo.com.Win32.DropperX-gen.13728.23487.exe
-
Size
10KB
-
Sample
221031-wyr1wsbgd7
-
MD5
42125c48f136b5a0f45c238b164981f5
-
SHA1
9c1eb44a7ff49dec8b076cf4b65bb21c6ef03afc
-
SHA256
0ecfc2d06b7a407dd8a05cefefe34a832ddd841d08b2f21fd401ff0db4b9fb32
-
SHA512
a79c000417a729d28559554a00210ba154eba703b93aed31c55ed07a93ca555e18facc5e5f90e033e7966919387fc1b4aa213adbf4afff5bf5e6129be522872c
-
SSDEEP
192:xExYQU0TZZSMAFE446Ax8stYcFmVc03KY:WeCZZS9FBAxptYcFmVc03K
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.DropperX-gen.13728.23487.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.DropperX-gen.13728.23487.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
SecuriteInfo.com.Win32.DropperX-gen.13728.23487.exe
-
Size
10KB
-
MD5
42125c48f136b5a0f45c238b164981f5
-
SHA1
9c1eb44a7ff49dec8b076cf4b65bb21c6ef03afc
-
SHA256
0ecfc2d06b7a407dd8a05cefefe34a832ddd841d08b2f21fd401ff0db4b9fb32
-
SHA512
a79c000417a729d28559554a00210ba154eba703b93aed31c55ed07a93ca555e18facc5e5f90e033e7966919387fc1b4aa213adbf4afff5bf5e6129be522872c
-
SSDEEP
192:xExYQU0TZZSMAFE446Ax8stYcFmVc03KY:WeCZZS9FBAxptYcFmVc03K
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-