General
-
Target
b7d6be7080c9caeb2ebea8764f9804f0fb8cb7185d67b5fcf8f4c7dbe0d8067b
-
Size
971KB
-
Sample
240214-b8dk2afc44
-
MD5
6e34450e0165fc144918a1b1c864903b
-
SHA1
89573d3cea44d4fb9dc1724f6c33fbf4e3d8c85a
-
SHA256
b7d6be7080c9caeb2ebea8764f9804f0fb8cb7185d67b5fcf8f4c7dbe0d8067b
-
SHA512
a9ed0e246f6f1dec15e019f9d369907ef125225732d333da29c1f03e8c07b186d52f3f901a402efc68a43e58c2f39c685ad9a8a983b1ad6f972b5dff253b7237
-
SSDEEP
12288:jhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4ae9MxUwOCNSGK+KVFeKWwb:pRmJkcoQricOIQxiZY1iae+yDZGJSD/T
Static task
static1
Behavioral task
behavioral1
Sample
b7d6be7080c9caeb2ebea8764f9804f0fb8cb7185d67b5fcf8f4c7dbe0d8067b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b7d6be7080c9caeb2ebea8764f9804f0fb8cb7185d67b5fcf8f4c7dbe0d8067b.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
b7d6be7080c9caeb2ebea8764f9804f0fb8cb7185d67b5fcf8f4c7dbe0d8067b
-
Size
971KB
-
MD5
6e34450e0165fc144918a1b1c864903b
-
SHA1
89573d3cea44d4fb9dc1724f6c33fbf4e3d8c85a
-
SHA256
b7d6be7080c9caeb2ebea8764f9804f0fb8cb7185d67b5fcf8f4c7dbe0d8067b
-
SHA512
a9ed0e246f6f1dec15e019f9d369907ef125225732d333da29c1f03e8c07b186d52f3f901a402efc68a43e58c2f39c685ad9a8a983b1ad6f972b5dff253b7237
-
SSDEEP
12288:jhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4ae9MxUwOCNSGK+KVFeKWwb:pRmJkcoQricOIQxiZY1iae+yDZGJSD/T
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-