General
-
Target
30082024_0200_28082024_Electro-08282024.7z
-
Size
697KB
-
Sample
240830-cfe4tssajc
-
MD5
93944b06a379e54c588ce5f17f928f7a
-
SHA1
08287a75150bed81469e3f8176cae5cfd61ad0a6
-
SHA256
a9728615030bd131152dc0898470f5ddfd792ae459f56974be09f103c616e6fd
-
SHA512
fa3a27705a89099f401621ed07437185d9eeee37d5dc72303b59596dfdc5c2fc2c01c17f4c074ad7592601cd3dd5846c7299afb0874c3b6df85d36fda1ab0cda
-
SSDEEP
12288:Q13iGyRfVXK3iTE+LOqnIGOTcuJYcTP8YSDObGjs9q7Vh0qIqsTbpqdyTP0OHta8:Q1qjK3MJlvOTjJHTLGssX0qLwsaczkzT
Static task
static1
Behavioral task
behavioral1
Sample
Electro-08282024.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Electro-08282024.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Electro-08282024.exe
-
Size
1.2MB
-
MD5
9d3827e8622b4221588f60a3273cb725
-
SHA1
1f1521c7c0d0f999d1afa921036082729fdb9261
-
SHA256
cec92fba69ba56563b3e84ed87291bfb50a85a6e44b6a9b5cd698c00c380e0f0
-
SHA512
661900d0386cee1af5806a6ad274f2f7dfe3d4624bf065814a509b84d1ed905c86449a64b879d3283dedb9b88d4189423e30f967e9f268c6e8094b35eb0cca51
-
SSDEEP
24576:8qDEvCTbMWu7rQYlBQcBiT6rprG8aF7wVq+wnazZkzFdd:8TvC/MTQYxsWR7aFAVlkzj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-