General
-
Target
bf67292051e20b9e56d15ab6aa97e020N
-
Size
1.8MB
-
Sample
240912-xtvfwszbjk
-
MD5
bf67292051e20b9e56d15ab6aa97e020
-
SHA1
fde26bd0c2f5a2949576671353ec83ba4d2ebf19
-
SHA256
28a1a3e5507582ca381e9a311ad857b3fa4538602da36d5307f050677387840b
-
SHA512
46dc21da298c65afc540b421fae70aa01e7d695360fe04d4388a5183fe8a75c15b46b2a857eab15c68939b457b9f2a3d4e87a9adae59755f8bb114430c129785
-
SSDEEP
49152:6yi6csvMJ+vbJCDF0CcB96kEG1ghVOuWBrmuBAt/3oDcLa:z7vjJzAqyuBAZ32cm
Static task
static1
Behavioral task
behavioral1
Sample
bf67292051e20b9e56d15ab6aa97e020N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
bf67292051e20b9e56d15ab6aa97e020N
-
Size
1.8MB
-
MD5
bf67292051e20b9e56d15ab6aa97e020
-
SHA1
fde26bd0c2f5a2949576671353ec83ba4d2ebf19
-
SHA256
28a1a3e5507582ca381e9a311ad857b3fa4538602da36d5307f050677387840b
-
SHA512
46dc21da298c65afc540b421fae70aa01e7d695360fe04d4388a5183fe8a75c15b46b2a857eab15c68939b457b9f2a3d4e87a9adae59755f8bb114430c129785
-
SSDEEP
49152:6yi6csvMJ+vbJCDF0CcB96kEG1ghVOuWBrmuBAt/3oDcLa:z7vjJzAqyuBAZ32cm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-