General
-
Target
IMAGLORYPARTICULARS.pdf.exe
-
Size
1.2MB
-
Sample
240924-lj666asgpe
-
MD5
56df03be9734d2b09133e82b56d74a6b
-
SHA1
c3e329bb8354aaaf5048fd1ae3612bebed98b944
-
SHA256
6dbdca6c496d751f9768583b199257024c067b8facde5b4984ab972b42c8bdfd
-
SHA512
6fff7ca27f72ef82fe77b82f7367e324881f334b4a7d598e50ec0aa0b7f9de17bc5e652cea3fb23f8ed9f86f94cbbaf590e68b4a26d695c65b0ad3b8ea407de6
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCn9dZhS/1b0IafFuXSTsiMgeMWTvxYN:7JZoQrbTFZY1iaCjU1taduXGugeNvk
Static task
static1
Behavioral task
behavioral1
Sample
IMAGLORYPARTICULARS.pdf.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
IMAGLORYPARTICULARS.pdf.exe
-
Size
1.2MB
-
MD5
56df03be9734d2b09133e82b56d74a6b
-
SHA1
c3e329bb8354aaaf5048fd1ae3612bebed98b944
-
SHA256
6dbdca6c496d751f9768583b199257024c067b8facde5b4984ab972b42c8bdfd
-
SHA512
6fff7ca27f72ef82fe77b82f7367e324881f334b4a7d598e50ec0aa0b7f9de17bc5e652cea3fb23f8ed9f86f94cbbaf590e68b4a26d695c65b0ad3b8ea407de6
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCn9dZhS/1b0IafFuXSTsiMgeMWTvxYN:7JZoQrbTFZY1iaCjU1taduXGugeNvk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-