General
-
Target
adc7e2d59b7ba16257a324402a842ca0N.exe
-
Size
4.5MB
-
Sample
240903-2vn3qazaqq
-
MD5
adc7e2d59b7ba16257a324402a842ca0
-
SHA1
d2d334d235caec709e77be6595a544992dbb6760
-
SHA256
5d9562f015510a723f1531ba29ed55eced3da6ae3402d5943fac358eb8f2ef87
-
SHA512
4dc7f99228ab880555181483637cdf0a79ec0c7c7827abb07b8c4e8bc2e6523208b2adb68afe6d8835fb0aed2c09762b77984938aeabb7a57e3b9e644ac6b7b0
-
SSDEEP
98304:SjysHjbTDnOTNn122TAqnLBBdzDBP40fkqXf0FFV3GJIT4bNJFY3OqtP4V:SjNHjbP82+LtBNfkSIFV2JjBHYf4V
Static task
static1
Behavioral task
behavioral1
Sample
adc7e2d59b7ba16257a324402a842ca0N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
adc7e2d59b7ba16257a324402a842ca0N.exe
-
Size
4.5MB
-
MD5
adc7e2d59b7ba16257a324402a842ca0
-
SHA1
d2d334d235caec709e77be6595a544992dbb6760
-
SHA256
5d9562f015510a723f1531ba29ed55eced3da6ae3402d5943fac358eb8f2ef87
-
SHA512
4dc7f99228ab880555181483637cdf0a79ec0c7c7827abb07b8c4e8bc2e6523208b2adb68afe6d8835fb0aed2c09762b77984938aeabb7a57e3b9e644ac6b7b0
-
SSDEEP
98304:SjysHjbTDnOTNn122TAqnLBBdzDBP40fkqXf0FFV3GJIT4bNJFY3OqtP4V:SjNHjbP82+LtBNfkSIFV2JjBHYf4V
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-