General
-
Target
3. BurgiesFreeTemp [V1].exe
-
Size
6.4MB
-
Sample
240902-ymmm5sxbqf
-
MD5
4a1589604e6c667277362505b766aca6
-
SHA1
94dea4851ef30d6b53c664980f9287709702187b
-
SHA256
3fd1f1a5ce10e38ec3880b643b31498d378806dfefff90820f3b73fed736dbaa
-
SHA512
9b9eb8bea26bcb796c2754e98fff4fceddc83ca74ebcb52dc99216926f76cf24526fe32ad1d337b21cf8e8aa9755a3171c44acde7c83c82eb70b9f83e0eb0781
-
SSDEEP
196608:0/UzgnQLcf7AjVgxowXJ2vfFoImTSGw9mqEgT3U6:0/IguU7225J2Xce9mWU6
Behavioral task
behavioral1
Sample
3. BurgiesFreeTemp [V1].exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
3. BurgiesFreeTemp [V1].exe
-
Size
6.4MB
-
MD5
4a1589604e6c667277362505b766aca6
-
SHA1
94dea4851ef30d6b53c664980f9287709702187b
-
SHA256
3fd1f1a5ce10e38ec3880b643b31498d378806dfefff90820f3b73fed736dbaa
-
SHA512
9b9eb8bea26bcb796c2754e98fff4fceddc83ca74ebcb52dc99216926f76cf24526fe32ad1d337b21cf8e8aa9755a3171c44acde7c83c82eb70b9f83e0eb0781
-
SSDEEP
196608:0/UzgnQLcf7AjVgxowXJ2vfFoImTSGw9mqEgT3U6:0/IguU7225J2Xce9mWU6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-