General
-
Target
97662e648efd892f1e00769e65c2fb3c673d28275060ecab581ac57ed878044c
-
Size
667KB
-
Sample
241123-cccvas1lcj
-
MD5
b2109e95b3a27a5941ac7773bc57dae8
-
SHA1
e1065564cd27153c5af94f1cd8cd93d84daa490c
-
SHA256
97662e648efd892f1e00769e65c2fb3c673d28275060ecab581ac57ed878044c
-
SHA512
dda570533ba7ec65fd4807f0b0f3ee803218ed642a4e0841f695e91d48763dfb355b0c4305859f945cbb64035acbbfb1554a527598732c0b439b200dc8b5373f
-
SSDEEP
12288:/saJBYCt5V6QbqCiYlsVxZrDCO12B3CcTspngcC0Z8CuFEG7tBHTzyzj:/tYYBb8YKxkO1CRggcZ89Bxl/yzj
Static task
static1
Behavioral task
behavioral1
Sample
CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe
-
Size
1.1MB
-
MD5
1ca01a88b80112024883e55a27b1345a
-
SHA1
3fdcd8cd1ff882b9c76dd93f680bb7f60fc97c7d
-
SHA256
a848e5d8d3a080b81556f4f7ec1fe1103610bf7bbb023065bf2e6696abaf6769
-
SHA512
9f978fe421c5217bccf787df0a105f584cd945be1f43e77f1971d688becaa9682a01acf7585b6bcaf4111103835dbcaa2caef59ccd393a16360cedebfb891125
-
SSDEEP
24576:Xtb20pkaCqT5TBWgNQ7aaGNhHYefDINn9Zr3qH6A:UVg5tQ7aaaHYaEN9K5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-