General
-
Target
Dark.exe
-
Size
2.2MB
-
Sample
240829-s6br4ayhlb
-
MD5
b0c952e0a98835d76da62b3bd4cb7828
-
SHA1
eb7fb06d56bdf35a8d253debf56b4fad947d5505
-
SHA256
f722a7285a79f697284d7e376ea3122398c84be2a13eed2b2470ff03d752faad
-
SHA512
26b1654de14667ed5181e136cf70394f280c85758782e28fae86675e93466602f7fdd3d8c1efd0b4a70bb9ddc8be4e527e45797c433067935062c64465245d7c
-
SSDEEP
49152:/0X0AsmM6YOcXExsPq2QdGcrkEhsuC06aGHYxKGOoz:/tAsmy/y90V8oHlZ
Static task
static1
Behavioral task
behavioral1
Sample
Dark.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Dark.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Dark.exe
-
Size
2.2MB
-
MD5
b0c952e0a98835d76da62b3bd4cb7828
-
SHA1
eb7fb06d56bdf35a8d253debf56b4fad947d5505
-
SHA256
f722a7285a79f697284d7e376ea3122398c84be2a13eed2b2470ff03d752faad
-
SHA512
26b1654de14667ed5181e136cf70394f280c85758782e28fae86675e93466602f7fdd3d8c1efd0b4a70bb9ddc8be4e527e45797c433067935062c64465245d7c
-
SSDEEP
49152:/0X0AsmM6YOcXExsPq2QdGcrkEhsuC06aGHYxKGOoz:/tAsmy/y90V8oHlZ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1File Deletion
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1