General
-
Target
K. Taean V31 Vessel's Particulars.docx.exe
-
Size
1.2MB
-
Sample
240924-eagrksshqp
-
MD5
7dc0d41fb18c3933f1a3849621006e86
-
SHA1
9ddd78acc47770bfb1777a65eb5dad1befedb9e6
-
SHA256
688f571ea22383cf80540084f6a6e2af098869fac4ab2028f744e262b61dd452
-
SHA512
0b881a078928214df15047966c706668342d00306a18aaaa577445a547dfdd1335f2344a88899868ec8087c8f85a774d5527d49b1afd2e4e0477a3d5d00c75dc
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaC4Su/Oo+yxoNZ/8N0WCyjMoIG1MS:7JZoQrbTFZY1iaC4ZLxoj8mWCyxIrS
Static task
static1
Behavioral task
behavioral1
Sample
K. Taean V31 Vessel's Particulars.docx.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
K. Taean V31 Vessel's Particulars.docx.exe
-
Size
1.2MB
-
MD5
7dc0d41fb18c3933f1a3849621006e86
-
SHA1
9ddd78acc47770bfb1777a65eb5dad1befedb9e6
-
SHA256
688f571ea22383cf80540084f6a6e2af098869fac4ab2028f744e262b61dd452
-
SHA512
0b881a078928214df15047966c706668342d00306a18aaaa577445a547dfdd1335f2344a88899868ec8087c8f85a774d5527d49b1afd2e4e0477a3d5d00c75dc
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaC4Su/Oo+yxoNZ/8N0WCyjMoIG1MS:7JZoQrbTFZY1iaC4ZLxoj8mWCyxIrS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-