General
-
Target
c94709dafba503c64eadc628c7497db95ed36f1e1296ef639c2c6be1154f323b
-
Size
695KB
-
Sample
240719-bdgzzavgmk
-
MD5
2ad8181dcb3d4983f5f03e8ac5f8d2a2
-
SHA1
e2f3e332bda9aa7b794b68e134bffef93f8eaf44
-
SHA256
c94709dafba503c64eadc628c7497db95ed36f1e1296ef639c2c6be1154f323b
-
SHA512
2845247be4bb30ed6c4e98afa67d7d48ac067e7f472fb2db99b919880e011153b5d54be95e2d64b464a5c38715f19aac3fb942bb2d09179ccea34f0c8945d219
-
SSDEEP
12288:uYV6MorX7qzuC3QHO9FQVHPF51jgcEM9js/k/oRVJZVsirlvxom4Zs+:NBXu9HGaVHd9js/dV1nEs+
Behavioral task
behavioral1
Sample
c94709dafba503c64eadc628c7497db95ed36f1e1296ef639c2c6be1154f323b.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
c94709dafba503c64eadc628c7497db95ed36f1e1296ef639c2c6be1154f323b
-
Size
695KB
-
MD5
2ad8181dcb3d4983f5f03e8ac5f8d2a2
-
SHA1
e2f3e332bda9aa7b794b68e134bffef93f8eaf44
-
SHA256
c94709dafba503c64eadc628c7497db95ed36f1e1296ef639c2c6be1154f323b
-
SHA512
2845247be4bb30ed6c4e98afa67d7d48ac067e7f472fb2db99b919880e011153b5d54be95e2d64b464a5c38715f19aac3fb942bb2d09179ccea34f0c8945d219
-
SSDEEP
12288:uYV6MorX7qzuC3QHO9FQVHPF51jgcEM9js/k/oRVJZVsirlvxom4Zs+:NBXu9HGaVHd9js/dV1nEs+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-