General
-
Target
POA1702108.exe
-
Size
1.3MB
-
Sample
240919-t6882azaqj
-
MD5
8a0bb862ed0acef45107d21e4735e8e1
-
SHA1
af9661b6eb2ca83be84d013ffcaaf750a38d6afe
-
SHA256
987b95ebff5f1b9e47105ea5c3d5fafc841b1fba94ae40630d956de2654ebdc6
-
SHA512
79a6eb5f61697a36c09d38f4c5ac2da1d4458dcfd13617d28a2d222f3726d38278914421bfb59c2e140ca012ab32727c1d5fc6f3c77ba5341a1b10528de1e3be
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCkt8T6K1lWIWnb2aY48LVbOolTXYO:7JZoQrbTFZY1iaCkeblWIWb2aY48xT1
Static task
static1
Behavioral task
behavioral1
Sample
POA1702108.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
POA1702108.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
POA1702108.exe
-
Size
1.3MB
-
MD5
8a0bb862ed0acef45107d21e4735e8e1
-
SHA1
af9661b6eb2ca83be84d013ffcaaf750a38d6afe
-
SHA256
987b95ebff5f1b9e47105ea5c3d5fafc841b1fba94ae40630d956de2654ebdc6
-
SHA512
79a6eb5f61697a36c09d38f4c5ac2da1d4458dcfd13617d28a2d222f3726d38278914421bfb59c2e140ca012ab32727c1d5fc6f3c77ba5341a1b10528de1e3be
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCkt8T6K1lWIWnb2aY48LVbOolTXYO:7JZoQrbTFZY1iaCkeblWIWb2aY48xT1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-