General
-
Target
peak.exe
-
Size
8.1MB
-
Sample
240328-v4glnscf89
-
MD5
6216754d616e11771cc50fff0191e270
-
SHA1
7d9d187690845a8bbc9a300fdc6e7a51d411b08b
-
SHA256
72c8c3dd1f471377a5e1f7bd7fc0345b7c90a2b4f2b95b31532161c269dcc0fd
-
SHA512
471fb4068fa6fdd20e1dc88a24bb9c22cf12d5422dbecc29b174070af0be6f5195800ad597e398ffe179604a4aa2518f0ec27bd2cf7dc8a395ef00dcd3a6c803
-
SSDEEP
196608:jTQs1gi/7DMLibCjMAhT7oarL1VnnvbWFTbPfiXr:jT+i/7DM+byHwSZTC/X
Static task
static1
Behavioral task
behavioral1
Sample
peak.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
peak.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
peak.exe
-
Size
8.1MB
-
MD5
6216754d616e11771cc50fff0191e270
-
SHA1
7d9d187690845a8bbc9a300fdc6e7a51d411b08b
-
SHA256
72c8c3dd1f471377a5e1f7bd7fc0345b7c90a2b4f2b95b31532161c269dcc0fd
-
SHA512
471fb4068fa6fdd20e1dc88a24bb9c22cf12d5422dbecc29b174070af0be6f5195800ad597e398ffe179604a4aa2518f0ec27bd2cf7dc8a395ef00dcd3a6c803
-
SSDEEP
196608:jTQs1gi/7DMLibCjMAhT7oarL1VnnvbWFTbPfiXr:jT+i/7DM+byHwSZTC/X
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-