General
-
Target
28092024_0322_26092024_SITHIPHORN_Doc2709202400000.rar
-
Size
16KB
-
Sample
240928-dw5j4axarc
-
MD5
7e607a2d7a2d69326973c0ea3bdfb138
-
SHA1
401b4c78ec4b8ef5c99ab62e517540543d7df60c
-
SHA256
05575771a33878dd35e54bfbecadc79b6780cbdd8dd4ab4738e255f8ac6b64a7
-
SHA512
f21803cf2df4838f12072fd26ec97e53d9cee885fb0f9b771590e4a89fd30a6fc9f910ddd8b78e8c76712dc8c8868fe9157f68b4e7f438abc887bc5c91b5610c
-
SSDEEP
384:L22eETT+Jzx4Tn+AcDgxUJ0tz5Ij1O/zpI1wve1cOt20:kETT+Jzx8SDPUz5ZpI1wve1cOo0
Static task
static1
Behavioral task
behavioral1
Sample
SITHIPHORN_Doc2709202400000.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
SITHIPHORN_Doc2709202400000.exe
-
Size
369KB
-
MD5
ba71b8b432f3c3575bca530cb8993a15
-
SHA1
4253e361af1f8711b09f5031b70c5a16c551c384
-
SHA256
bfbda87afcd9cc4f6e39550149d7ebfcaebd2ee97e38d69842d93f7f12c2a05f
-
SHA512
5a92287dd3feb012d9a3b77372f5160d8e566203b2126dfb3aee3a64a0b8a2c274e542d3c84272240b25b4c0c9e25736ab0d6b303dda2fa7d26a23dfa85cf462
-
SSDEEP
384:jSYfj/Of4imYnyEVPTHWKtL2H0VuM35zlQEew+yTzSf4JM54iICSCr4H444uiiiw:jHjQ4KnyAWkaHRQMwdz+4H4447iiL1i
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-