Analysis
-
max time kernel
136s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2024, 05:48
Behavioral task
behavioral1
Sample
Guna.UI2.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Guna.UI2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Velocitylol.exe
Resource
win7-20240708-en
General
-
Target
Velocitylol.exe
-
Size
421KB
-
MD5
03dc9e5783a59b398d82d8d9b8a05358
-
SHA1
f5b32f0ac7bbd17dfe718ff28122bd18a6b74fb8
-
SHA256
730f9bf833862454350cebd595433cad213b8291fc583d19edaee5da2a39523e
-
SHA512
1d6b416fb8409f88c727f9b117c3823593dcfdbcada6296c7871cb2ff78b9c294b2614d96beb357dbe793c462a71fa3a70fc5d4f9e6c11a76b45539b77e7d208
-
SSDEEP
12288:QhuuolNImrwCoPOe0cXb0cFY1lKBhvm9Ue4Nj:FRle0Sb0cFY1lEhCK
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral4/memory/3088-6-0x0000000006690000-0x00000000068A2000-memory.dmp family_agenttesla -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Velocitylol.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Velocitylol.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Velocitylol.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Velocitylol.exe