General
-
Target
MV TASOS Vessel's Details.docx.exe
-
Size
1.3MB
-
Sample
240930-eegx5swgmk
-
MD5
f3dde6c8bc9bfb2c6ade147f57072fd8
-
SHA1
20806b6ab0070ed41d131b699c75b652557b860e
-
SHA256
51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9
-
SHA512
58c512a61eccfb112322b5d65342aef412a3825ef04bf0f7c08b26b4d516826c6d3ff2d2dec82456c862e81ebad6f25445e2c7a46f506e80252b7b46e7e42d02
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLF+DtPR6xcLnBJR+CjuCd8SiN2mjJEH:f3v+7/5QLF+DtRUSDsC6Cd8Sr+eH
Static task
static1
Behavioral task
behavioral1
Sample
MV TASOS Vessel's Details.docx.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
MV TASOS Vessel's Details.docx.exe
-
Size
1.3MB
-
MD5
f3dde6c8bc9bfb2c6ade147f57072fd8
-
SHA1
20806b6ab0070ed41d131b699c75b652557b860e
-
SHA256
51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9
-
SHA512
58c512a61eccfb112322b5d65342aef412a3825ef04bf0f7c08b26b4d516826c6d3ff2d2dec82456c862e81ebad6f25445e2c7a46f506e80252b7b46e7e42d02
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLF+DtPR6xcLnBJR+CjuCd8SiN2mjJEH:f3v+7/5QLF+DtRUSDsC6Cd8Sr+eH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-