General
-
Target
45c1433d1344ab472d18aa57b65d3c6b184b04148e7b69194c501ede658372b0
-
Size
641KB
-
Sample
240417-qxxbbsbe6t
-
MD5
ed52496cb4bc9dfb1c4f9ab1f5f1cac5
-
SHA1
1347e04ce6deeca1ccb99c00fa0344836db1b35e
-
SHA256
45c1433d1344ab472d18aa57b65d3c6b184b04148e7b69194c501ede658372b0
-
SHA512
ecb1c2fa4fc585a26552051dfbc596a50b5ff250faf50a434a4b00acb120263ca46043fb3792095e35a6a1efaba9ca460cbc53cc885fa412c0ecad68159a8e24
-
SSDEEP
12288:8Ck+8h7seH2Kp46eoAFTTuVsOsAOs58OlLfMKWJvrUvdnNN4c:8CkRsoOb5ilxOs+ULkK4vrUvd1
Static task
static1
Behavioral task
behavioral1
Sample
e7456c57dba442a7e63f2bd45ff5be6c8168f2fcfd15c5e405536fb3bb212dcb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e7456c57dba442a7e63f2bd45ff5be6c8168f2fcfd15c5e405536fb3bb212dcb.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
kigtiqm.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
kigtiqm.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
xmnxoix.vbs
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
xmnxoix.vbs
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
e7456c57dba442a7e63f2bd45ff5be6c8168f2fcfd15c5e405536fb3bb212dcb.exe
-
Size
804KB
-
MD5
e8b61b099af93918a7d59477334471e0
-
SHA1
a2ce7a730e96bf6c8f9cd512993fd67cf0c10767
-
SHA256
e7456c57dba442a7e63f2bd45ff5be6c8168f2fcfd15c5e405536fb3bb212dcb
-
SHA512
30b93418d244b71718a7fbf6683c27ac4bc799338f67d915367cb7cb5b93dab661b5b9071f49e055e9701d721ef3e788a0632adc062ecd32d1ffe225712bd855
-
SSDEEP
12288:IYgBDMwdNEb40oLhLr1+vuYdCllN9cnUstwbvhz58lZNKXGLfR:IYgB7mINL/vbDci1p2d
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
kigtiqm.exe
-
Size
872KB
-
MD5
c56b5f0201a3b3de53e561fe76912bfd
-
SHA1
2a4062e10a5de813f5688221dbeb3f3ff33eb417
-
SHA256
237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
-
SHA512
195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
SSDEEP
12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01
Score3/10 -
-
-
Target
xmnxoix.au3
-
Size
4KB
-
MD5
0d013f6baac0a09a1fb8e14217317503
-
SHA1
453fba3488930e98d075946a31e5455b84eed5ba
-
SHA256
0a78523b6163a8372ba64e5cc275d68f6582b7ca3a93e3163ad96251cc788d83
-
SHA512
05032c4bbdc56992768a87ebaa9a9f43cb9092df401bb61a20673c1bec3a1f3fe4ee7c55c0572ceac9d862538ac765d0e0577cb63424c5edf137f7948feb8ced
-
SSDEEP
96:8Qj+oh+0ddn/qEMA98SM/26Ai9qFnOnYPUub2:l+oh+0ddn/KA98//26Ao0Oyry
Score1/10 -