General
-
Target
C0R566573T91513557.eml
-
Size
1.2MB
-
Sample
241008-hnljgatgjk
-
MD5
46f6aa31b509938be8741be5b5e4c078
-
SHA1
0bc7b6ed107abc2a0747d7598412d7a603664810
-
SHA256
e79b178fc9b4872c8d911cc276ace2b63e28f1fb622f943a132509de7c82e7fc
-
SHA512
110ad70aff6f5d10ef26a5790fbeca7a8d991af7cdf11cd786df6c06ef9ca0f114369f20e4d693501bef9ccd5c48f039233bc6c4e2be59b437129f68d7abd6ec
-
SSDEEP
24576:Gw1SabxrNmPJP824Oq91lXav+jwmmJPZrim9uROetT0GQtEXk:I0OiloEtPbk
Static task
static1
Behavioral task
behavioral1
Sample
PO-A1702108.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
PO-A1702108.exe
-
Size
1.2MB
-
MD5
e3eee7377eba76e0929864fd08ef3628
-
SHA1
a6fa1f8496f975acc822eb574139a75a28bc61c6
-
SHA256
5367636e08ae00354a1bfdabdc3adde3d0421130d7c601bd2faa9e2d310279ec
-
SHA512
65e2ec420571b71ed5238e2e388a887d0aef2f6728c9ee6665ef4047454510bc7fca441989cc6689f4effd280b192cf7f6592e7ee88a105b09cf9a35757c8f7e
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLGOdfmMJGj8vMpCei9Nuy:f3v+7/5QLcr8Epfi9Nuy
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-