General
-
Target
ddbe0ed9d7e98d03eb859755074ddd8edb7fa55ecbf40d2564e4c9b4f601cb8d.exe
-
Size
1.2MB
-
Sample
241009-pp388svark
-
MD5
a8a6b34259911c9e8bea040600547b3c
-
SHA1
675de0e7d337d1e8c212f1c9f475ba5a37405290
-
SHA256
ddbe0ed9d7e98d03eb859755074ddd8edb7fa55ecbf40d2564e4c9b4f601cb8d
-
SHA512
81169ef9c8bff637aa1614a1f8dea0857671415ce134c58d551f07c6400ac399cd82d9694c08284caf7ad1cb12a7305b2a7fa46cb588822d628f3c38cb24a606
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCfbsVjXxfkI3a6InNWj+mWY:7JZoQrbTFZY1iaCfMfkVhSJ
Static task
static1
Behavioral task
behavioral1
Sample
ddbe0ed9d7e98d03eb859755074ddd8edb7fa55ecbf40d2564e4c9b4f601cb8d.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
ddbe0ed9d7e98d03eb859755074ddd8edb7fa55ecbf40d2564e4c9b4f601cb8d.exe
-
Size
1.2MB
-
MD5
a8a6b34259911c9e8bea040600547b3c
-
SHA1
675de0e7d337d1e8c212f1c9f475ba5a37405290
-
SHA256
ddbe0ed9d7e98d03eb859755074ddd8edb7fa55ecbf40d2564e4c9b4f601cb8d
-
SHA512
81169ef9c8bff637aa1614a1f8dea0857671415ce134c58d551f07c6400ac399cd82d9694c08284caf7ad1cb12a7305b2a7fa46cb588822d628f3c38cb24a606
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCfbsVjXxfkI3a6InNWj+mWY:7JZoQrbTFZY1iaCfMfkVhSJ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-