General
-
Target
0ca04624018e1b0234ad520ab681fc7357f5dc1b537f860fc9a4849b4c207b11
-
Size
432KB
-
Sample
240619-cmdjkssbkb
-
MD5
22269c9e26e7aa5d4168bb2b7acad1b3
-
SHA1
9c18f20bceeeb671f745458b4bf4f8d217a84173
-
SHA256
0ca04624018e1b0234ad520ab681fc7357f5dc1b537f860fc9a4849b4c207b11
-
SHA512
a3c0a97eed520fb5bd6578b48bf8992fd62ae913eb5b3940423800a2f913614b5c7eb39d0fd038f4edd98aa5512a16dabcc5f8c601ac93260af8d91dd9350e17
-
SSDEEP
6144:Sij2hYUvFIsP3QYniXjBMzMZEYPoT5yeCG7j2+7pmEjQ2GTVbC:QFIsPA7TS5YwT5HjhMd5Jb
Static task
static1
Behavioral task
behavioral1
Sample
0ca04624018e1b0234ad520ab681fc7357f5dc1b537f860fc9a4849b4c207b11.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0ca04624018e1b0234ad520ab681fc7357f5dc1b537f860fc9a4849b4c207b11.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
5.0
107.175.101.198:7000
dvNrQCwanoQ9ouuD
-
install_file
USB.exe
Extracted
agenttesla
https://api.telegram.org/bot6410198048:AAGgeWnhGxZeYMKJkRauoOJwGKdxJztyd4k/
Targets
-
-
Target
0ca04624018e1b0234ad520ab681fc7357f5dc1b537f860fc9a4849b4c207b11
-
Size
432KB
-
MD5
22269c9e26e7aa5d4168bb2b7acad1b3
-
SHA1
9c18f20bceeeb671f745458b4bf4f8d217a84173
-
SHA256
0ca04624018e1b0234ad520ab681fc7357f5dc1b537f860fc9a4849b4c207b11
-
SHA512
a3c0a97eed520fb5bd6578b48bf8992fd62ae913eb5b3940423800a2f913614b5c7eb39d0fd038f4edd98aa5512a16dabcc5f8c601ac93260af8d91dd9350e17
-
SSDEEP
6144:Sij2hYUvFIsP3QYniXjBMzMZEYPoT5yeCG7j2+7pmEjQ2GTVbC:QFIsPA7TS5YwT5HjhMd5Jb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload
-
StormKitty payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-