General
-
Target
PO-A1702108.exe
-
Size
1.2MB
-
Sample
240924-pk9kfsvcmj
-
MD5
514233f0589be5d977a1ee164fe8db1d
-
SHA1
bf713daec188be3a005e1a2097b4f5cb68ccc222
-
SHA256
6abd474c86db77c6943522762f5658eb58c523bb84d68fcc6495a2cbbff72e9e
-
SHA512
6f5b4d6175b593e2d287d25369dfdbba7bca44ea487ad7e7d39628670480eb63f8795f6ef56478d215b5f05ef76d74af26fe184d2d434416b657d1ba694b3261
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCbLRWEjIQeK88hCPbkfX6Jp:7JZoQrbTFZY1iaCbNkQN8SPap
Static task
static1
Behavioral task
behavioral1
Sample
PO-A1702108.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
PO-A1702108.exe
-
Size
1.2MB
-
MD5
514233f0589be5d977a1ee164fe8db1d
-
SHA1
bf713daec188be3a005e1a2097b4f5cb68ccc222
-
SHA256
6abd474c86db77c6943522762f5658eb58c523bb84d68fcc6495a2cbbff72e9e
-
SHA512
6f5b4d6175b593e2d287d25369dfdbba7bca44ea487ad7e7d39628670480eb63f8795f6ef56478d215b5f05ef76d74af26fe184d2d434416b657d1ba694b3261
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCbLRWEjIQeK88hCPbkfX6Jp:7JZoQrbTFZY1iaCbNkQN8SPap
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-