General
-
Target
xedelijokedimo.exe
-
Size
2.3MB
-
Sample
231107-afyvtsac64
-
MD5
01324e882fe74a1a458449b292ae1366
-
SHA1
cf3128213db05a20065b77d9a8c61ea5bbeb57a0
-
SHA256
ba25d29763f058662a8e236a0fd994b785ab63414e8b91422344a564e401c47e
-
SHA512
9c045689f44edd6e3f836543d17469e5bd313b74f11ee1a679defbe40c7cb01c7c18c9d14bf4a8514049b9c1c836bd69dd7b89158a5fcf209033d7ffa589b6be
-
SSDEEP
49152:YfWjgYEitVwmzwGXvlBNH89kLZnT/kqXfd+/9A:Y+bEszBfhBVnT/kqXf0F
Static task
static1
Malware Config
Targets
-
-
Target
xedelijokedimo.exe
-
Size
2.3MB
-
MD5
01324e882fe74a1a458449b292ae1366
-
SHA1
cf3128213db05a20065b77d9a8c61ea5bbeb57a0
-
SHA256
ba25d29763f058662a8e236a0fd994b785ab63414e8b91422344a564e401c47e
-
SHA512
9c045689f44edd6e3f836543d17469e5bd313b74f11ee1a679defbe40c7cb01c7c18c9d14bf4a8514049b9c1c836bd69dd7b89158a5fcf209033d7ffa589b6be
-
SSDEEP
49152:YfWjgYEitVwmzwGXvlBNH89kLZnT/kqXfd+/9A:Y+bEszBfhBVnT/kqXf0F
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-