General
-
Target
904778c189b5a510616820a25b28dac3ec4140a4c2e3f81077cb835446dbeec5.exe
-
Size
1.2MB
-
Sample
240904-twm8tavdld
-
MD5
d274f6df86f74e3a7d315211e49236b6
-
SHA1
46a75a67ed19b7455a8a439fb04ef63c7665f65e
-
SHA256
904778c189b5a510616820a25b28dac3ec4140a4c2e3f81077cb835446dbeec5
-
SHA512
0cc915825336d5f9a2386a7b1a4bf62a0da35f733bed7f92f16184e5ff215286e3327dceffb8d68b768d93d51ed99c5a448189f428b29d88857f6c5cc4ac005d
-
SSDEEP
24576:EqDEvCTbMWu7rQYlBQcBiT6rprG8awUEgbLiAfu299:ETvC/MTQYxsWR7awUEwLiq
Static task
static1
Behavioral task
behavioral1
Sample
904778c189b5a510616820a25b28dac3ec4140a4c2e3f81077cb835446dbeec5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
904778c189b5a510616820a25b28dac3ec4140a4c2e3f81077cb835446dbeec5.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
904778c189b5a510616820a25b28dac3ec4140a4c2e3f81077cb835446dbeec5.exe
-
Size
1.2MB
-
MD5
d274f6df86f74e3a7d315211e49236b6
-
SHA1
46a75a67ed19b7455a8a439fb04ef63c7665f65e
-
SHA256
904778c189b5a510616820a25b28dac3ec4140a4c2e3f81077cb835446dbeec5
-
SHA512
0cc915825336d5f9a2386a7b1a4bf62a0da35f733bed7f92f16184e5ff215286e3327dceffb8d68b768d93d51ed99c5a448189f428b29d88857f6c5cc4ac005d
-
SSDEEP
24576:EqDEvCTbMWu7rQYlBQcBiT6rprG8awUEgbLiAfu299:ETvC/MTQYxsWR7awUEwLiq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-