General
-
Target
ce46e26eae5bbf50d9ea07bb76b77addedbb3bb8282356e88bdc9da54b6e929f.exe
-
Size
1.2MB
-
Sample
240807-cm737ayanj
-
MD5
ec786fad02a45cd0c757e5188f194389
-
SHA1
dc0f16c4a56e632ff256c5fef9a098e4b7014206
-
SHA256
ce46e26eae5bbf50d9ea07bb76b77addedbb3bb8282356e88bdc9da54b6e929f
-
SHA512
a97c25426cc65ecb7d20d5b435d6c103c13630077a39168d9de211355acc1556a41610cf1a5cc334c4951f34ef95fc0e939f2d38b2be0612d315f184f3912716
-
SSDEEP
24576:gqDEvCTbMWu7rQYlBQcBiT6rprG8aMx/gW/miUUMPD8J9o:gTvC/MTQYxsWR7aMGW/VUUMrE
Static task
static1
Behavioral task
behavioral1
Sample
ce46e26eae5bbf50d9ea07bb76b77addedbb3bb8282356e88bdc9da54b6e929f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ce46e26eae5bbf50d9ea07bb76b77addedbb3bb8282356e88bdc9da54b6e929f.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ce46e26eae5bbf50d9ea07bb76b77addedbb3bb8282356e88bdc9da54b6e929f.exe
-
Size
1.2MB
-
MD5
ec786fad02a45cd0c757e5188f194389
-
SHA1
dc0f16c4a56e632ff256c5fef9a098e4b7014206
-
SHA256
ce46e26eae5bbf50d9ea07bb76b77addedbb3bb8282356e88bdc9da54b6e929f
-
SHA512
a97c25426cc65ecb7d20d5b435d6c103c13630077a39168d9de211355acc1556a41610cf1a5cc334c4951f34ef95fc0e939f2d38b2be0612d315f184f3912716
-
SSDEEP
24576:gqDEvCTbMWu7rQYlBQcBiT6rprG8aMx/gW/miUUMPD8J9o:gTvC/MTQYxsWR7aMGW/VUUMrE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-