General
-
Target
WNMKLPOM.exe
-
Size
776KB
-
Sample
240910-yhjexs1hnl
-
MD5
23fa0cbfe43f369add91ec3efa5e10ee
-
SHA1
1b088335f3a3aca7badbee0ab163b71340757143
-
SHA256
6baa7d88418ff396ff940fb4247a20d82e0c54a1544b97a9a738675ff09d7395
-
SHA512
30da1a62628d6e085d98b620e9b7ef705fee1be8a1a7355dd9f1353557480d7e825d2a6d0478977f1421618cb1215327e1648043c079c0bac7fe149a87e41616
-
SSDEEP
24576:5Vmsfk7iLD5y5eDQmRg0zPhlHfA4AKO9Vz1S2Sz:pqeo0QmR91lI4I9VzUV
Static task
static1
Behavioral task
behavioral1
Sample
WNMKLPOM.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1195357500636147762/wTcRg3fQF-X958tQhh_GUJFHQMIaKcScI699hXJZD2rma64AWMXB3KbXiRQwwWAEc8-8
Targets
-
-
Target
WNMKLPOM.exe
-
Size
776KB
-
MD5
23fa0cbfe43f369add91ec3efa5e10ee
-
SHA1
1b088335f3a3aca7badbee0ab163b71340757143
-
SHA256
6baa7d88418ff396ff940fb4247a20d82e0c54a1544b97a9a738675ff09d7395
-
SHA512
30da1a62628d6e085d98b620e9b7ef705fee1be8a1a7355dd9f1353557480d7e825d2a6d0478977f1421618cb1215327e1648043c079c0bac7fe149a87e41616
-
SSDEEP
24576:5Vmsfk7iLD5y5eDQmRg0zPhlHfA4AKO9Vz1S2Sz:pqeo0QmR91lI4I9VzUV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-