General
-
Target
08102024_1354_08102024_PO-A1702108.tar
-
Size
883KB
-
Sample
241008-q7zjfatcnh
-
MD5
7b0308945254da641471f92241861462
-
SHA1
83691e6aac6d564e2034f5db955fd8c8d7622895
-
SHA256
98d48614dfcdd17411511930a7a5c5138c38e09c03ac3f53ddd560e994e51fe5
-
SHA512
468266d70a0d534903d95b42b6704e346f900f913761a60f18bfdff276308cbb8fd4fb3bed057a9aca2e2b1db710391f55b3e8fb72038e36045dce58a0dae2d3
-
SSDEEP
24576:9QE7NFqah7S4Mz0rupg4EAeKuk4nH+DHWGPyB3:JNFFe5zfpgXkWH+TpPy5
Static task
static1
Behavioral task
behavioral1
Sample
PO-A1702108.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
PO-A1702108.exe
-
Size
1.2MB
-
MD5
e3eee7377eba76e0929864fd08ef3628
-
SHA1
a6fa1f8496f975acc822eb574139a75a28bc61c6
-
SHA256
5367636e08ae00354a1bfdabdc3adde3d0421130d7c601bd2faa9e2d310279ec
-
SHA512
65e2ec420571b71ed5238e2e388a887d0aef2f6728c9ee6665ef4047454510bc7fca441989cc6689f4effd280b192cf7f6592e7ee88a105b09cf9a35757c8f7e
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLGOdfmMJGj8vMpCei9Nuy:f3v+7/5QLcr8Epfi9Nuy
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-