General
-
Target
RippleWoofer.exe
-
Size
15.8MB
-
Sample
240902-pbenqazcnr
-
MD5
4cc80d3eded1e6fe6291f410746fe182
-
SHA1
43af000a15988600186898e6b313ec282c61a404
-
SHA256
04f7cba421f4d722c23764c3c11952a500c458beb7af689baac4bc40cfb818c9
-
SHA512
dec77618d20f28eb695329ace74915abc5af4d39010e770e78138c4d619fbeea8fd6a028ae8508ff4f6dcbd01a8cb84068727da4c8c81543dda8c8f63e7557a8
-
SSDEEP
393216:+iI3FUn3pS/fMzNH/uYWmsgpC6PqjaaLq/aanPrrz73Mg2:+l1s3pqfGNH2Y5vpC6PqjaaLqSaXz4J
Malware Config
Targets
-
-
Target
RippleWoofer.exe
-
Size
15.8MB
-
MD5
4cc80d3eded1e6fe6291f410746fe182
-
SHA1
43af000a15988600186898e6b313ec282c61a404
-
SHA256
04f7cba421f4d722c23764c3c11952a500c458beb7af689baac4bc40cfb818c9
-
SHA512
dec77618d20f28eb695329ace74915abc5af4d39010e770e78138c4d619fbeea8fd6a028ae8508ff4f6dcbd01a8cb84068727da4c8c81543dda8c8f63e7557a8
-
SSDEEP
393216:+iI3FUn3pS/fMzNH/uYWmsgpC6PqjaaLq/aanPrrz73Mg2:+l1s3pqfGNH2Y5vpC6PqjaaLqSaXz4J
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-