General
-
Target
680053fa589159be381eefbb2dc016960a91beefe3d976e742000008be43067a.exe
-
Size
1.2MB
-
Sample
241016-b99d4axake
-
MD5
8f8efad685362993d81ff8a2316e545b
-
SHA1
06004934a883422e375886bf537fdb8e13300071
-
SHA256
680053fa589159be381eefbb2dc016960a91beefe3d976e742000008be43067a
-
SHA512
28a29bdd536acc34d262843486ccb27d01bb90866a4c517df5ff3d3a320aec1c5605508cf0cdbe3af34626af1178dd1733a159de2385684989c73d4d4b98aa83
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLbj6ngZtjU61JzjPyHGLXZndu1Cu7:f3v+7/5QLbj66tjUO/Pym7ZGv
Static task
static1
Behavioral task
behavioral1
Sample
680053fa589159be381eefbb2dc016960a91beefe3d976e742000008be43067a.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
680053fa589159be381eefbb2dc016960a91beefe3d976e742000008be43067a.exe
-
Size
1.2MB
-
MD5
8f8efad685362993d81ff8a2316e545b
-
SHA1
06004934a883422e375886bf537fdb8e13300071
-
SHA256
680053fa589159be381eefbb2dc016960a91beefe3d976e742000008be43067a
-
SHA512
28a29bdd536acc34d262843486ccb27d01bb90866a4c517df5ff3d3a320aec1c5605508cf0cdbe3af34626af1178dd1733a159de2385684989c73d4d4b98aa83
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLbj6ngZtjU61JzjPyHGLXZndu1Cu7:f3v+7/5QLbj66tjUO/Pym7ZGv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-